Digital image watermarking method based on adversarial attack

A digital image and watermark technology, applied in the fields of image processing and information hiding, can solve the problems of weak watermark robustness, poor watermark invisibility, and low watermark embedding capacity, and achieve strong watermark invisibility and high watermark embedding capacity. , the effect of increasing the watermark embedding capacity

Active Publication Date: 2021-08-06
XIDIAN UNIV
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide an image watermarking method based on adversarial attacks to solve the problems of poor watermark invisibility and weak watermark rob

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital image watermarking method based on adversarial attack
  • Digital image watermarking method based on adversarial attack
  • Digital image watermarking method based on adversarial attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0041] refer to figure 1 , to further describe in detail the specific steps realized by the method of the present invention.

[0042] Step 1. Construct a neural network with an input dimension of 1024 and an output dimension of 10 and set parameters.

[0043] Build a 12-layer neural network, its structure is as follows: the first convolutional layer, the second convolutional layer, the first pooling layer, the first dropout layer, the third convolutional layer, the fourth convolutional layer, the second The pooling layer, the second dropout layer, the flattening layer, the first fully connected layer, the third dropout layer, and the second fully connected layer.

[0044] Set the output channels of the first to fourth convolutional layers to 32, 32, 64, and 64 respectively, and the convolution kernel sizes to 32×32, 30×30, 15×15, 13×13, and the step sizes are all set

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an image watermarking method based on adversarial attack. The method comprises the following specific steps: (1) establishing a neural network; (2) generating a training set; (3) training a neural network; (4) partitioning the carrier image into blocks; (5) dividing and converting the watermark sequence; (6) generating an adversarial image block by using the adversarial attack to obtain a watermark-containing image; (7) partitioning the image containing the watermark; (8) obtaining a watermark sequence fragment by using a neural network; and (9) splicing the watermark sequence fragments to obtain the watermark sequence. The method has the advantages that on the premise that indexes such as imperceptibility and safety of a watermark algorithm are met, the performance such as embedding capacity can be enhanced along with improvement of the classification capacity of a network model, and meanwhile the algorithm has good robustness to attacks such as filtering attacks, clipping and compression.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products