CN100535915C - Image management method based on mobile communication terminal - Google Patents

Image management method based on mobile communication terminal Download PDF

Info

Publication number
CN100535915C
CN100535915C CNB200410095595XA CN200410095595A CN100535915C CN 100535915 C CN100535915 C CN 100535915C CN B200410095595X A CNB200410095595X A CN B200410095595XA CN 200410095595 A CN200410095595 A CN 200410095595A CN 100535915 C CN100535915 C CN 100535915C
Authority
CN
China
Prior art keywords
image
mobile communication
communication terminal
watermark
intrinsic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB200410095595XA
Other languages
Chinese (zh)
Other versions
CN1708157A (en
Inventor
严敏永
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur LG Digital Mobile Communications Co Ltd
Original Assignee
LG Electronics China Research and Development Center Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LG Electronics China Research and Development Center Co Ltd filed Critical LG Electronics China Research and Development Center Co Ltd
Publication of CN1708157A publication Critical patent/CN1708157A/en
Application granted granted Critical
Publication of CN100535915C publication Critical patent/CN100535915C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to an image management method based on mobile communication terminal comprising the following steps: receiving and temporarily storing the image when receiving the image information from the external; inserting the watermark produced in the said image temporarily storing by the inherent code of the mobile communication terminal; storing the said image injected the watermark. The invention utilizes the inherent code of the mobile communication terminal to generate the watermark and injects the watermark into the original image. When receiving the image having the watermark, the invention can grasp whether the injecting watermark of the image is utilizing the inherent code by the relativity with the inherent code of the mobile communication terminal, and the invention can decide to store or not so as to prevent the image being illegally misappropriated or propagated, and the invention can trace the disseminator and restrain the illegally propagating for the already disseminative image.

Description

A kind of image management method based on mobile communication terminal
Technical field
The present invention relates to image management method, illegally usurping or distribute and in the image of downloading, insert the watermark that utilizes the terminal intrinsic information to generate for the image that prevents to download by mobile communication terminal based on mobile communication terminal.
Background technology
Along with popularizing fast of mobile communication terminal, the continuing to bring out of various means of communication, the raising day by day of mobile communication terminal self function, the multimedia of using based on mobile communication terminal increases sharply.
The performance of the employed controller of mobile communication terminal, the performance of display part and memory span have obtained improvement at full speed, the mobile communication terminal that appears on the market at present has the built-in camera of the above resolution of 2,000,000 pixels, can take rest image and live image by it, can utilize various means of communication, receiving multimedia content is also play.
Because many people are using the mobile communication terminal of band multimedia function, the user wishes to break away from the stereotyped of mobile communication terminal, by revise screen, the tinkle of bells etc. make own mobile communication terminal realization differential require increasing.In order to cater to user's this needs, numerous content suppliers is providing various image informations, activity video information, the tinkle of bells information etc., uses the number of users of above-mentioned information sharply to increase.
Under this trend; the supplier of these numerical informations or the owner of content not only advocate returning the copyright of my all information (copyrights such as image or audio frequency, video etc.); not only to protect copyright, when providing the works of oneself, also require corresponding cost to other people.
But copyright is owing on its characteristic, exist many problems aspect copyright protection.In the open space that information such as internet are easy to store, change, can not be subjected to restriction ground massive duplication, after duplicating, not only kept and original identical data message, and agreed just can propagate without the author, be difficult to protect author's copyright.
So the infringement copyright problem that takes place is serious just day by day, has therefore proposed the legality that addresses this is that in a large number, institutional method.Such as method of encrypting and digital watermarking (Digital Watermarking) technology etc., method of encrypting is that data are encrypted, so that have only the specific user could use corresponding information, digital watermark technology is to hide copyright information and transmit to the user in data, corresponding data can't be changed from the outside, and they can deserve to be called the technical solution that can solve the above-mentioned problem of mentioning.
Wherein, watermark is as the copy-right protection method of numerical data, and the copyright that can be described as at digital content shows and the proof technology.In data, hide copyright information, and then detect hiding copyright information again, thereby can find making up and forging of data, advocate author's entitlement.
The method of inserting this watermark have living space method (spatial method) and frequency field method (frequency domain method).Space law is to add trickle variation in the data such as pixel value of picture, used as watermark.The frequency field method is to utilize discrete cosine transform (DCT:Distance Cosine Transform), Fast Fourier Transform (FFT) (FFT:Fast Fourier Transform) or wavelet transform (Wavelet Transform), the data-switching of digital morphological is become the simulating signal of radio-frequency component, utilize identical conversion method conversion then, insert the technology of watermark.
This watermark often is applied to illegal piracy, propagates serious image information, the following describes the process of inserting watermark in image information.
Fig. 1 is the pie graph of one of explanation previous methods of inserting watermark in image, and Fig. 2 is that explanation is analyzed the image that inserted watermark, judges whether to insert watermark and found out the pie graph of one of previous methods of hiding Info.
In general pattern compression retrieving algorithm, the frequency field method is when main when utilizing mode based on DCT or wavelet transform that image transitions is become radio-frequency component, the high frequency band major part is a boundary member, energy distribution is low, be conceived to this, insert the key that generates with Any Digit herein, generate the image of band watermark.And in the time will reducing the watermark of having inserted, the correlativity (Correlation) of grasp and given key value if more than reference value, then is considered as having inserted watermark, utilizes above-mentioned key value to grasp the information of hiding with watermark.
As shown in Figure 1, analyze image originally by marking analysis portion 10, image transitions is become the image that pretends through the marking, the copyright relevant information made hide Info, disperse by information dispersion portion 20, simultaneously, insert the key that utilizes Any Digit to generate, generate watermark by watermark generating unit 30.The watermark information that generates like this is mixed in the script image, generates and inserted the image of watermark.
And, as shown in Figure 2, the image that utilizes said method to insert watermark is converted to the image that pretends through the marking again by marking analysis portion 40, watermark detection portion 50 utilizes the image after the conversion and inserted the image of watermark and the key that once used judges whether to insert watermark, the copyright relevant information that 60 reduction of watermark extracting portion are hidden when inserting watermark.
But watermark insertion method as above is owing to be that the information of copyright is inserted respective image, so, when dispute over copyright takes place, can confirm former copyright person effectively, but not be a kind of means that can prevent illegal piracy, propagation.That is,, so just can't grasp the object that to advocate copyright, so this method prevents that the function of above-mentioned phenomenon is limited if can't understand whose propagation or usurp respective image.
That is, when the digital watermark that utilizes in the past, can't prevent the propagation between the mobile communication terminal or duplicate from root, for by internet etc. to not specific a plurality of people's diffusion, can't find the person liable.
As mentioned above; utilized the image that mobile communication terminal downloads there are the following problems in the past; that is, owing on the copyright feature, propagated or illegally usurped easily; be difficult to protect copyright; even in image, insert watermark in order to protect copyright, also only just can understand whether have copyright, can't prevent the propagation between the mobile communication terminal or duplicate from root; for by internet etc. to not specific a plurality of people's diffusion, can't find the person liable.
Summary of the invention
The object of the present invention is to provide a kind of image management method based on mobile communication terminal, when downloading image, the watermark that the intrinsic code that utilizes mobile communication terminal generates is inserted in the image that will download, when having inserted the image propagates of corresponding intrinsic code as watermark, can follow the trail of the blazer, can only work as the intrinsic code that receive to utilize the mobile communication terminal that to download when having inserted the image of watermark, could be stored in image in the terminal, even respective image is offered other mobile communication terminal, still can not store.
For realizing as above purpose, feature of the present invention is to comprise following several steps: when utilizing mobile communication terminal to pass through wireless communication networks download images information, providing the server of image to provide to have inserted intrinsic code with above-mentioned mobile communication terminal is the step of the image of the watermark that generates of key value; The mobile communication terminal of having downloaded above-mentioned image utilizes the above-mentioned image of intrinsic code detection of self whether to insert watermark, have only when being to have inserted just to store respective image when intrinsic code with described mobile communication terminal is the image of the watermark that generates of key value, otherwise the step of not storing.
Another feature of the present invention is: the watermark of all images that the intrinsic code check that above-mentioned mobile communication terminal utilizes self receives from the outside, have only when being to have inserted just to store respective image when intrinsic code with described mobile communication terminal is the image of watermark of key value generation.
Another feature of the present invention is to comprise following several steps: when receiving image information from the outside, receive the step of image and interim storage; In the image of above-mentioned interim storage, insert the step of the watermark that utilizes the intrinsic code generation of mobile communication terminal; Store the above-mentioned step of having inserted the image of watermark.
Effect of the present invention is, after utilizing the intrinsic code of mobile communication terminal to generate watermark based on the image management method of mobile communication terminal, be inserted in the script image, when the image of receiving belt watermark, can whether be to utilize the intrinsic code of oneself to insert the image of watermark by grasping with the correlativity of the intrinsic code of mobile communication terminal, can determine whether store, can prevent illegally usurping or propagating of image thereby have, for the image of having propagated, can follow the trail of the blazer, control the effect of illegal propagation.
Description of drawings
Fig. 1 is the block diagram that inserts the constituent apparatus in the past of watermark in image;
Fig. 2 judges whether to insert watermark and the block diagram of the constituent apparatus in the past that extraction hides Info from the image that has inserted watermark;
Fig. 3 is the block diagram of constituent apparatus of the insertion watermark of one embodiment of the invention;
Fig. 4 is the composition of the constituent apparatus of the storage of the one embodiment of the invention image that inserts watermark;
Fig. 5 is the signal flow graph of the step of the reception of one embodiment of the invention and the image that watermark is inserted in storage;
Fig. 6 is reception image of another embodiment of the present invention and the signal flow graph that inserts the watermark step.
The symbol description of accompanying drawing major part:
10: marking analysis portion 20: information dispersion portion
30: watermark generating unit 40: marking analysis portion
50: watermark detection portion 60: watermark extracting portion
Embodiment
With reference to the accompanying drawings, describe the present invention who as above constitutes in detail.
Fig. 3 is the block diagram that inserts the constituent apparatus of watermark in image of one embodiment of the invention.As shown in the figure, when generation comprises the watermark that hides Info, use the intrinsic information (being pseudo noise (PN:Pseudo Noise) code) of mobile communication terminal to replace key here.
Though also can utilize general Any Digit to generate key, utilize the above-mentioned storage mobile communication terminal that hides Info, to compare with the method for using the intrinsic code of mobile communication terminal to replace key, its efficient is lower.Promptly, as shown in the figure, if replace key, the intrinsic information that can distinguish mobile communication terminal itself is used as key, need not other hiding Info so and insert or extraction step, just can obtain to have inserted the mobile communication terminal intrinsic information that comprises in the image of watermark.
As mentioned above, the step of image can be by the content provider one side enforcement that image is provided originally the watermark insertion of the intrinsic information generation that utilizes mobile communication terminal.Lift a simple example, when mobile communication terminal is connected to wireless Internet and download images, because above-mentioned communication system is known the intrinsic information that connects and select the mobile communication terminal of image in advance, so before image is provided, respective image is inserted in the watermark that the mobile communication terminal intrinsic information that utilizes request to download generates, subsequently the image that inserts watermark is offered above-mentioned mobile communication terminal.That is to say that the image that has so inserted the watermark that utilizes the mobile communication terminal intrinsic information generation that will download becomes mobile communication corresponding terminal-specific image.
Fig. 4 shows that mobile communication terminal receives image that has inserted the watermark that utilizes the intrinsic code generation of set mobile communication terminal and the step of storing.In the present embodiment, utilize the mobile communication terminal intrinsic information that once used when inserting watermark, differentiate image and whether insert watermark, extraction hides Info, and utilizes above-mentioned information to judge whether to store the image that has inserted watermark.
As the above-mentioned explanation of doing, at enforcement of the present invention, for whether the image of judging the band watermark inserts watermark, only by taking the correlativity (Correlation) with mobile communication terminal intrinsic information value, whether the image that just can judge above-mentioned band watermark has with the mobile communication terminal intrinsic information value that will store is the watermark that key generates.
Just allow storage when therefore, having only image when above-mentioned band watermark to be processed into the mobile communication terminal special use (that is, inserting the watermark that utilizes mobile communication corresponding terminal intrinsic information to generate) that receives this image.Under situation in addition, make it and to store for preventing that image from usurping.
As above-mentioned situation, hide Info and also can utilize the intrinsic code of mobile communication terminal to extract, but, because the burden of mobile communication terminal strengthens, only utilize mobile communication terminal intrinsic information as key, just being enough to prevent that image from usurping and appending the blazer, is not essential therefore.
Utilize as upper type, the image that be stored in the mobile communication terminal is made mobile communication corresponding terminal-specific image, and have only special image to store, so, then can't utilize mobile communication terminal to download other mobile communication terminal special image.
Promptly, before the image that connects by wired, wireless mode and download is stored, intrinsic information with mobile communication terminal is a key value, judge whether respective image inserts watermark, have only when judge when watermark is arranged (, when utilizing corresponding intrinsic information key to insert watermark) just implement image storage, so, just can cut off by the connection between the terminal and be media transitive graph picture between terminal with computer etc.
And, if utilizing computer to duplicate from terminal has above-mentionedly inserted the image of watermark and it has been propagated on the internet, then can from the image of above-mentioned propagation, extract terminal information about the blazer, therefore illegal piracy, blazer can be searched and punish, the illegal effect of controlling of propagating of cutting off can be brought into play.
Fig. 5 is from the signal flow graph of content provider when mobile communication terminal provides image by wireless communication networks.As shown in the figure, if terminal also provides the intrinsic information (telephone number or PN code etc.) of oneself simultaneously to content provider's requested image by the base station, so, the foregoing supplier is the intrinsic code with the mobile communication corresponding terminal that the watermark that key value generates is inserted in the requested image, then the image that has inserted watermark is offered above-mentioned mobile communication terminal.Above-mentioned mobile communication terminal receives and has inserted the image of watermark, after grasping the intrinsic code value and the correlativity between the image of reception of oneself, if this result is more than set limits value, then being judged as is to utilize the intrinsic code value of oneself to insert the image of watermark, and image is stored in the storer.
Because this is to receive to have inserted the image of watermark,, can reduce system loading so whether the image of a mobile communication terminal GPRS band watermark is to utilize the watermark of the intrinsic code insertion of oneself to get final product when downloading by wireless network.
In addition, carry out before this all images storage that before image storage, can externally provide, also can only be defined in when directly being connected or enforcement when wireless network is downloaded with terminal to the analysis whether watermark is arranged.
Fig. 6 is mobile communication terminal inserts the step of watermark in image a signal flow graph.As shown in the figure, the content provider offers mobile communication terminal to the image that does not carry out any processing, and the terminal of downloading this image is that key value inserts watermark with the intrinsic information of mobile communication terminal before it is stored, and stores then.In this case, watermark can be used for staying for the illegal propagation that prevents download images the user's of download images information, also can be used for when respective image is illegally propagated, and analyzes the watermark of inserting, thereby finds out initial blazer.
But, as above implementing to insert under the situation of watermark step by mobile communication terminal, also can add a kind of function again, promptly, before not being to store, implementing watermark analysis by communication network but by the image that direct connection receives from the outside, if do not insert the watermark of self intrinsic code, then make it and to store.
As mentioned above, in the present invention, replace key, after the intrinsic code of use mobile communication terminal generates watermark, be inserted in the image, when reduction, also use the intrinsic code of mobile communication terminal, thus illegally usurping or propagating of image can be prevented, for the image of having propagated, can follow the trail of the blazer, control illegal propagation.
In sum, effect of the present invention is, after the image management method that the present invention is based on mobile communication terminal utilizes the intrinsic code of mobile communication terminal to generate watermark, be inserted in the script image, when the image of receiving belt watermark, can whether be to utilize the intrinsic code of oneself to insert the image of watermark by grasping with the correlativity of the intrinsic code of mobile communication terminal, can determine whether store, can prevent illegally usurping or propagating of image thereby have, for the image of having propagated, can follow the trail of the blazer, control the effect of illegal propagation.
Above embodiment only is used to illustrate the present invention, but not is used to limit the present invention.

Claims (5)

1. image management method based on mobile communication terminal, it is characterized in that comprising following several steps: when utilizing mobile communication terminal to pass through wireless communication networks download images information, providing the server of image to provide to have inserted intrinsic code with described mobile communication terminal is the step of the image of the watermark that generates of key value; The mobile communication terminal of having downloaded described image utilizes the described image of intrinsic code detection of self whether to insert watermark, have only when being to have inserted just to store respective image when intrinsic code with described mobile communication terminal is the image of the watermark that generates of key value, otherwise the step of not storing.
2. the image management method based on mobile communication terminal according to claim 1 is characterized in that: the intrinsic code of described mobile communication terminal is the telephone number or the intrinsic pseudo noise code of mobile communication terminal.
3. the image management method based on mobile communication terminal according to claim 1, it is characterized in that: described mobile communication terminal utilizes the watermark of all images that own intrinsic code check receives from the outside, has only when being just to store respective image when being with intrinsic code with described mobile communication terminal to be the image of watermark of key value generation.
4. the image management method based on mobile communication terminal according to claim 1, it is characterized in that: the image that described mobile communication terminal is downloaded by communication network in storage is during with the image that receives from other mobile communication terminal that utilizes the mode that directly is connected mobile communication terminal to connect, utilize the watermark of the intrinsic code check image of oneself, have only and when be band with the intrinsic code of described mobile communication terminal being the image of the watermark that generates of key value, just store respective image.
5. the image management method based on mobile communication terminal is characterized in that comprising following several steps: when receiving image information from the outside, receive the step of image and interim storage; In the image of described interim storage, insert the step of the watermark that utilizes the intrinsic code generation of mobile communication terminal; Store the described step of having inserted the image of watermark.
CNB200410095595XA 2004-06-12 2004-12-02 Image management method based on mobile communication terminal Expired - Fee Related CN100535915C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020040043307A KR20050118002A (en) 2004-06-12 2004-06-12 Image managing method for mobile communication terminal
KR1020040043307 2004-06-12

Publications (2)

Publication Number Publication Date
CN1708157A CN1708157A (en) 2005-12-14
CN100535915C true CN100535915C (en) 2009-09-02

Family

ID=35581753

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB200410095595XA Expired - Fee Related CN100535915C (en) 2004-06-12 2004-12-02 Image management method based on mobile communication terminal

Country Status (2)

Country Link
KR (1) KR20050118002A (en)
CN (1) CN100535915C (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101923733B (en) * 2010-08-16 2015-04-01 中兴通讯股份有限公司 Method and device for processing electronic entrance ticket
CN102025966A (en) * 2010-12-15 2011-04-20 中兴通讯股份有限公司 Video telephone communication method and terminal
KR101321478B1 (en) * 2012-02-22 2013-10-28 숭실대학교산학협력단 Method and Apparatus for controlling application execution
KR101440766B1 (en) * 2013-08-09 2014-09-18 디에스글로벌 (주) Method for virtual image delivery service using printed matter
CN108133382A (en) * 2017-12-24 2018-06-08 苏州云葫芦信息科技有限公司 Trade mark usurps early warning system and method
CN108650491B (en) * 2018-05-15 2020-07-07 西安电子科技大学 Video watermark detection method for monitoring system

Also Published As

Publication number Publication date
CN1708157A (en) 2005-12-14
KR20050118002A (en) 2005-12-15

Similar Documents

Publication Publication Date Title
Lian et al. Recent advances in multimedia information system security
Macq et al. Benchmarking of image watermarking algorithms for digital rights management
Voyatzis et al. The use of watermarks in the protection of digital multimedia products
JP2001519099A (en) Method and apparatus for imprinting ID information on digital content and reading it out
US20090316894A1 (en) Method and apparatus for checking consistency between digital contents
EP2960819A1 (en) A method and system embedding a non-detectable fingerprint in a digital media file
JP2004194233A (en) Contents management apparatus and contents distribution apparatus
KR20080029446A (en) System for providing information using audio watermarking and method thereof
CN103678960B (en) Method and device for adding digital copyright information to data file
Huang et al. Techniques and applications of intelligent multimedia data hiding
CN100535915C (en) Image management method based on mobile communication terminal
US20030007662A1 (en) Enhanced watermark computing method
CN112257036A (en) Digital work copyright protection method and device based on playing end
Rao et al. R,“Digital watermarking: applications, techniques and attacks”
US7987513B2 (en) Data-use restricting method and computer product
CN101795265B (en) Method for downloading digital media information
Cacciaguerra et al. Data hiding: steganography and copyright marking
Noor et al. High performance and energy efficient image watermarking for video using a mobile device
Verma Review of steganography techniques
CN112257035A (en) Digital work copyright protection method and device based on playing platform
CN114363068A (en) Image-text publishing method and device, electronic equipment and storage medium
Rawat et al. Review of methodologies and techniques for digital watermarking
KR100659870B1 (en) Mobile terminal and method for servicing contents
KR20030041501A (en) Method for providing and certificating contents by using water mark
Jonker et al. Security aspects of DRM systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: LANGCHAO LEJIN DIGITAL MOBILE COMMUNICATION CO., L

Free format text: FORMER OWNER: LG ELECTRONIC (CHINA) RESEARCH + DEVELOPMENT CENTRE CO., LTD.

Effective date: 20120312

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100102 CHAOYANG, BEIJING TO: 264006 YANTAI, SHANDONG PROVINCE

TR01 Transfer of patent right

Effective date of registration: 20120312

Address after: 264006 No. 228 Changjiang Road, Yantai Economic Development Zone, Shandong, China

Patentee after: Langchao Lejin Digital Mobile Communication Co., Ltd.

Address before: Two Beijing 100102 Chaoyang District city in Wangjing Lize Park No. 203 Petrova building block B

Patentee before: LG Electronic (China) Research and Development Center Co., Ltd.

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090902

Termination date: 20161202

CF01 Termination of patent right due to non-payment of annual fee