计算机工程与应用 ›› 2019, Vol. 55 ›› Issue (10): 103-107.DOI: 10.3778/j.issn.1002-8331.1802-0160

• 网络、通信与安全 • 上一篇    下一篇

面向二维码的数字水印置入与提取方法

李国和1,2,陈  晨1,2,吴卫江1,2,郑艺峰1,2,洪云峰3,周晓明3   

  1. 1.中国石油大学(北京) 石油数据挖掘北京市重点实验室,北京 102249
    2.中国石油大学(北京) 地球物理与信息工程学院,北京 102249
    3.石大兆信数字身份管理与物联网技术研究院,北京 100029
  • 出版日期:2019-05-15 发布日期:2019-05-13

Method of Imbedding and Extracting Watermark for Two-Dimensional Code Images

LI Guohe1,2, CHEN Chen1,2, WU Weijiang1,2, ZHENG Yifeng1,2, HONG Yunfeng3, ZHOU Xiaoming3   

  1. 1.Key Lab of Petroleum Data Mining, China University of Petroleum, Beijing 102249, China
    2.College of Geophysics and Information Engineering, China University of Petroleum, Beijing 102249, China
    3.PanPass Institute of Digital Identification Management and Internet of Things, Beijing 100029, China
  • Online:2019-05-15 Published:2019-05-13

摘要: 二维码在产品防伪、追溯等领域中广泛应用,数字水印不仅能有效保护其所属权,而且不影响其正常使用。水印在二维码中具有不可见性、鲁棒性。首先对二维码图像进行分块,并对每个分块进行离散余弦变换(Discrete Cosine Transform,DCT);其次对每一分块再取中心块进行奇异值分解(Singular Value Decomposition,SVD);最后将经Logistic和Arnold变换加密后的水印图像置入到奇异值分解后的特征值中,形成置入水印的二维码。二维码置入水印的逆过程实现了水印的提取。实验证实了二维码中水印能有效抵抗图像多种攻击,具有良好的鲁棒性、安全性和不可见性。

关键词: 二维码, 数字水印, 加密, 解密

Abstract: The two-dimensional code is widely applied in production security and traceability, whose ownership is effectively protected by watermark and which is also correctly recognized. The watermark in the two-dimensional code has the good features such as the invisibility and robustness and so on. Firstly, the image of two-dimensional code is partitioned into some blocks, and then each block is transformed by DCT. Secondly, the center range of every block is further transformed by SVD. At last, the image of watermark is encrypted by Logistic and Arnold Transform, forming encrypted watermark which is embedded into feature vector of SVD, and then the image of two-dimensional code with watermark is formed. The extraction of watermark from the two-dimensional code with watermark is the inversed procedure of embedding watermark into the two-dimension code. The experiments show that the watermark in the two-dimensional code can effectively resist a variety of attacks, having excellent robustness, security and invisibility.

Key words: two-dimensional code, digital watermark, encryption, decryption