A kind of image management method based on mobile communication terminal
Technical field
The present invention relates to image management method, illegally usurping or distribute and in the image of downloading, insert the watermark that utilizes the terminal intrinsic information to generate for the image that prevents to download by mobile communication terminal based on mobile communication terminal.
Background technology
Along with popularizing fast of mobile communication terminal, the continuing to bring out of various means of communication, the raising day by day of mobile communication terminal self function, the multimedia of using based on mobile communication terminal increases sharply.
The performance of the employed controller of mobile communication terminal, the performance of display part and memory span have obtained improvement at full speed, the mobile communication terminal that appears on the market at present has the built-in camera of the above resolution of 2,000,000 pixels, can take rest image and live image by it, can utilize various means of communication, receiving multimedia content is also play.
Because many people are using the mobile communication terminal of band multimedia function, the user wishes to break away from the stereotyped of mobile communication terminal, by revise screen, the tinkle of bells etc. make own mobile communication terminal realization differential require increasing.In order to cater to user's this needs, numerous content suppliers is providing various image informations, activity video information, the tinkle of bells information etc., uses the number of users of above-mentioned information sharply to increase.
Under this trend; the supplier of these numerical informations or the owner of content not only advocate returning the copyright of my all information (copyrights such as image or audio frequency, video etc.); not only to protect copyright, when providing the works of oneself, also require corresponding cost to other people.
But copyright is owing on its characteristic, exist many problems aspect copyright protection.In the open space that information such as internet are easy to store, change, can not be subjected to restriction ground massive duplication, after duplicating, not only kept and original identical data message, and agreed just can propagate without the author, be difficult to protect author's copyright.
So the infringement copyright problem that takes place is serious just day by day, has therefore proposed the legality that addresses this is that in a large number, institutional method.Such as method of encrypting and digital watermarking (Digital Watermarking) technology etc., method of encrypting is that data are encrypted, so that have only the specific user could use corresponding information, digital watermark technology is to hide copyright information and transmit to the user in data, corresponding data can't be changed from the outside, and they can deserve to be called the technical solution that can solve the above-mentioned problem of mentioning.
Wherein, watermark is as the copy-right protection method of numerical data, and the copyright that can be described as at digital content shows and the proof technology.In data, hide copyright information, and then detect hiding copyright information again, thereby can find making up and forging of data, advocate author's entitlement.
The method of inserting this watermark have living space method (spatial method) and frequency field method (frequency domain method).Space law is to add trickle variation in the data such as pixel value of picture, used as watermark.The frequency field method is to utilize discrete cosine transform (DCT:Distance Cosine Transform), Fast Fourier Transform (FFT) (FFT:Fast Fourier Transform) or wavelet transform (Wavelet Transform), the data-switching of digital morphological is become the simulating signal of radio-frequency component, utilize identical conversion method conversion then, insert the technology of watermark.
This watermark often is applied to illegal piracy, propagates serious image information, the following describes the process of inserting watermark in image information.
Fig. 1 is the pie graph of one of explanation previous methods of inserting watermark in image, and Fig. 2 is that explanation is analyzed the image that inserted watermark, judges whether to insert watermark and found out the pie graph of one of previous methods of hiding Info.
In general pattern compression retrieving algorithm, the frequency field method is when main when utilizing mode based on DCT or wavelet transform that image transitions is become radio-frequency component, the high frequency band major part is a boundary member, energy distribution is low, be conceived to this, insert the key that generates with Any Digit herein, generate the image of band watermark.And in the time will reducing the watermark of having inserted, the correlativity (Correlation) of grasp and given key value if more than reference value, then is considered as having inserted watermark, utilizes above-mentioned key value to grasp the information of hiding with watermark.
As shown in Figure 1, analyze image originally by marking analysis portion 10, image transitions is become the image that pretends through the marking, the copyright relevant information made hide Info, disperse by information dispersion portion 20, simultaneously, insert the key that utilizes Any Digit to generate, generate watermark by watermark generating unit 30.The watermark information that generates like this is mixed in the script image, generates and inserted the image of watermark.
And, as shown in Figure 2, the image that utilizes said method to insert watermark is converted to the image that pretends through the marking again by marking analysis portion 40, watermark detection portion 50 utilizes the image after the conversion and inserted the image of watermark and the key that once used judges whether to insert watermark, the copyright relevant information that 60 reduction of watermark extracting portion are hidden when inserting watermark.
But watermark insertion method as above is owing to be that the information of copyright is inserted respective image, so, when dispute over copyright takes place, can confirm former copyright person effectively, but not be a kind of means that can prevent illegal piracy, propagation.That is,, so just can't grasp the object that to advocate copyright, so this method prevents that the function of above-mentioned phenomenon is limited if can't understand whose propagation or usurp respective image.
That is, when the digital watermark that utilizes in the past, can't prevent the propagation between the mobile communication terminal or duplicate from root, for by internet etc. to not specific a plurality of people's diffusion, can't find the person liable.
As mentioned above; utilized the image that mobile communication terminal downloads there are the following problems in the past; that is, owing on the copyright feature, propagated or illegally usurped easily; be difficult to protect copyright; even in image, insert watermark in order to protect copyright, also only just can understand whether have copyright, can't prevent the propagation between the mobile communication terminal or duplicate from root; for by internet etc. to not specific a plurality of people's diffusion, can't find the person liable.
Summary of the invention
The object of the present invention is to provide a kind of image management method based on mobile communication terminal, when downloading image, the watermark that the intrinsic code that utilizes mobile communication terminal generates is inserted in the image that will download, when having inserted the image propagates of corresponding intrinsic code as watermark, can follow the trail of the blazer, can only work as the intrinsic code that receive to utilize the mobile communication terminal that to download when having inserted the image of watermark, could be stored in image in the terminal, even respective image is offered other mobile communication terminal, still can not store.
For realizing as above purpose, feature of the present invention is to comprise following several steps: when utilizing mobile communication terminal to pass through wireless communication networks download images information, providing the server of image to provide to have inserted intrinsic code with above-mentioned mobile communication terminal is the step of the image of the watermark that generates of key value; The mobile communication terminal of having downloaded above-mentioned image utilizes the above-mentioned image of intrinsic code detection of self whether to insert watermark, have only when being to have inserted just to store respective image when intrinsic code with described mobile communication terminal is the image of the watermark that generates of key value, otherwise the step of not storing.
Another feature of the present invention is: the watermark of all images that the intrinsic code check that above-mentioned mobile communication terminal utilizes self receives from the outside, have only when being to have inserted just to store respective image when intrinsic code with described mobile communication terminal is the image of watermark of key value generation.
Another feature of the present invention is to comprise following several steps: when receiving image information from the outside, receive the step of image and interim storage; In the image of above-mentioned interim storage, insert the step of the watermark that utilizes the intrinsic code generation of mobile communication terminal; Store the above-mentioned step of having inserted the image of watermark.
Effect of the present invention is, after utilizing the intrinsic code of mobile communication terminal to generate watermark based on the image management method of mobile communication terminal, be inserted in the script image, when the image of receiving belt watermark, can whether be to utilize the intrinsic code of oneself to insert the image of watermark by grasping with the correlativity of the intrinsic code of mobile communication terminal, can determine whether store, can prevent illegally usurping or propagating of image thereby have, for the image of having propagated, can follow the trail of the blazer, control the effect of illegal propagation.
Description of drawings
Fig. 1 is the block diagram that inserts the constituent apparatus in the past of watermark in image;
Fig. 2 judges whether to insert watermark and the block diagram of the constituent apparatus in the past that extraction hides Info from the image that has inserted watermark;
Fig. 3 is the block diagram of constituent apparatus of the insertion watermark of one embodiment of the invention;
Fig. 4 is the composition of the constituent apparatus of the storage of the one embodiment of the invention image that inserts watermark;
Fig. 5 is the signal flow graph of the step of the reception of one embodiment of the invention and the image that watermark is inserted in storage;
Fig. 6 is reception image of another embodiment of the present invention and the signal flow graph that inserts the watermark step.
The symbol description of accompanying drawing major part:
10: marking analysis portion 20: information dispersion portion
30: watermark generating unit 40: marking analysis portion
50: watermark detection portion 60: watermark extracting portion
Embodiment
With reference to the accompanying drawings, describe the present invention who as above constitutes in detail.
Fig. 3 is the block diagram that inserts the constituent apparatus of watermark in image of one embodiment of the invention.As shown in the figure, when generation comprises the watermark that hides Info, use the intrinsic information (being pseudo noise (PN:Pseudo Noise) code) of mobile communication terminal to replace key here.
Though also can utilize general Any Digit to generate key, utilize the above-mentioned storage mobile communication terminal that hides Info, to compare with the method for using the intrinsic code of mobile communication terminal to replace key, its efficient is lower.Promptly, as shown in the figure, if replace key, the intrinsic information that can distinguish mobile communication terminal itself is used as key, need not other hiding Info so and insert or extraction step, just can obtain to have inserted the mobile communication terminal intrinsic information that comprises in the image of watermark.
As mentioned above, the step of image can be by the content provider one side enforcement that image is provided originally the watermark insertion of the intrinsic information generation that utilizes mobile communication terminal.Lift a simple example, when mobile communication terminal is connected to wireless Internet and download images, because above-mentioned communication system is known the intrinsic information that connects and select the mobile communication terminal of image in advance, so before image is provided, respective image is inserted in the watermark that the mobile communication terminal intrinsic information that utilizes request to download generates, subsequently the image that inserts watermark is offered above-mentioned mobile communication terminal.That is to say that the image that has so inserted the watermark that utilizes the mobile communication terminal intrinsic information generation that will download becomes mobile communication corresponding terminal-specific image.
Fig. 4 shows that mobile communication terminal receives image that has inserted the watermark that utilizes the intrinsic code generation of set mobile communication terminal and the step of storing.In the present embodiment, utilize the mobile communication terminal intrinsic information that once used when inserting watermark, differentiate image and whether insert watermark, extraction hides Info, and utilizes above-mentioned information to judge whether to store the image that has inserted watermark.
As the above-mentioned explanation of doing, at enforcement of the present invention, for whether the image of judging the band watermark inserts watermark, only by taking the correlativity (Correlation) with mobile communication terminal intrinsic information value, whether the image that just can judge above-mentioned band watermark has with the mobile communication terminal intrinsic information value that will store is the watermark that key generates.
Just allow storage when therefore, having only image when above-mentioned band watermark to be processed into the mobile communication terminal special use (that is, inserting the watermark that utilizes mobile communication corresponding terminal intrinsic information to generate) that receives this image.Under situation in addition, make it and to store for preventing that image from usurping.
As above-mentioned situation, hide Info and also can utilize the intrinsic code of mobile communication terminal to extract, but, because the burden of mobile communication terminal strengthens, only utilize mobile communication terminal intrinsic information as key, just being enough to prevent that image from usurping and appending the blazer, is not essential therefore.
Utilize as upper type, the image that be stored in the mobile communication terminal is made mobile communication corresponding terminal-specific image, and have only special image to store, so, then can't utilize mobile communication terminal to download other mobile communication terminal special image.
Promptly, before the image that connects by wired, wireless mode and download is stored, intrinsic information with mobile communication terminal is a key value, judge whether respective image inserts watermark, have only when judge when watermark is arranged (, when utilizing corresponding intrinsic information key to insert watermark) just implement image storage, so, just can cut off by the connection between the terminal and be media transitive graph picture between terminal with computer etc.
And, if utilizing computer to duplicate from terminal has above-mentionedly inserted the image of watermark and it has been propagated on the internet, then can from the image of above-mentioned propagation, extract terminal information about the blazer, therefore illegal piracy, blazer can be searched and punish, the illegal effect of controlling of propagating of cutting off can be brought into play.
Fig. 5 is from the signal flow graph of content provider when mobile communication terminal provides image by wireless communication networks.As shown in the figure, if terminal also provides the intrinsic information (telephone number or PN code etc.) of oneself simultaneously to content provider's requested image by the base station, so, the foregoing supplier is the intrinsic code with the mobile communication corresponding terminal that the watermark that key value generates is inserted in the requested image, then the image that has inserted watermark is offered above-mentioned mobile communication terminal.Above-mentioned mobile communication terminal receives and has inserted the image of watermark, after grasping the intrinsic code value and the correlativity between the image of reception of oneself, if this result is more than set limits value, then being judged as is to utilize the intrinsic code value of oneself to insert the image of watermark, and image is stored in the storer.
Because this is to receive to have inserted the image of watermark,, can reduce system loading so whether the image of a mobile communication terminal GPRS band watermark is to utilize the watermark of the intrinsic code insertion of oneself to get final product when downloading by wireless network.
In addition, carry out before this all images storage that before image storage, can externally provide, also can only be defined in when directly being connected or enforcement when wireless network is downloaded with terminal to the analysis whether watermark is arranged.
Fig. 6 is mobile communication terminal inserts the step of watermark in image a signal flow graph.As shown in the figure, the content provider offers mobile communication terminal to the image that does not carry out any processing, and the terminal of downloading this image is that key value inserts watermark with the intrinsic information of mobile communication terminal before it is stored, and stores then.In this case, watermark can be used for staying for the illegal propagation that prevents download images the user's of download images information, also can be used for when respective image is illegally propagated, and analyzes the watermark of inserting, thereby finds out initial blazer.
But, as above implementing to insert under the situation of watermark step by mobile communication terminal, also can add a kind of function again, promptly, before not being to store, implementing watermark analysis by communication network but by the image that direct connection receives from the outside, if do not insert the watermark of self intrinsic code, then make it and to store.
As mentioned above, in the present invention, replace key, after the intrinsic code of use mobile communication terminal generates watermark, be inserted in the image, when reduction, also use the intrinsic code of mobile communication terminal, thus illegally usurping or propagating of image can be prevented, for the image of having propagated, can follow the trail of the blazer, control illegal propagation.
In sum, effect of the present invention is, after the image management method that the present invention is based on mobile communication terminal utilizes the intrinsic code of mobile communication terminal to generate watermark, be inserted in the script image, when the image of receiving belt watermark, can whether be to utilize the intrinsic code of oneself to insert the image of watermark by grasping with the correlativity of the intrinsic code of mobile communication terminal, can determine whether store, can prevent illegally usurping or propagating of image thereby have, for the image of having propagated, can follow the trail of the blazer, control the effect of illegal propagation.
Above embodiment only is used to illustrate the present invention, but not is used to limit the present invention.