CN102142129A - Visual secret sharing-based image content tampering detection method - Google Patents
Visual secret sharing-based image content tampering detection method Download PDFInfo
- Publication number
- CN102142129A CN102142129A CN 201110056411 CN201110056411A CN102142129A CN 102142129 A CN102142129 A CN 102142129A CN 201110056411 CN201110056411 CN 201110056411 CN 201110056411 A CN201110056411 A CN 201110056411A CN 102142129 A CN102142129 A CN 102142129A
- Authority
- CN
- China
- Prior art keywords
- image
- algorithm
- watermark
- original
- watermarking images
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention discloses a visual secret sharing-based image content tampering detection method. The method comprises the following steps of: generating a watermarking image by using copyright information of the image; generating a verification shadow and a detection shadow by combining the content characteristic of the image; recovering a water mark from the verification shadow and the detection shadow by using a visual secret sharing technology; and comparing the recovered water mark with the original watermarking to determine whether the image is tampered so as to realize tampering detection and determine the position of a tampered region. In the method, the watermarking image is generated by using the copyright information of the image without embedding and extracting the watermarking, but the tampering detection of image content is realized by using the visual secret sharing technology on the premise of not damaging the original image data.
Description
Technical field
The invention belongs to the multi-media information security technical field, be specifically related to a kind of based on the secret picture material altering detecting method of sharing of vision.
Background technology
Along with developing rapidly of network technology and digitizing technique, the interchange of multimedia messages has reached unprecedented range.The application of the development of while image processing techniques and powerful image editing software makes domestic consumer can edit, distort raw image data easily, makes the effect of mixing the spurious with the genuine.This has reduced the credibility of multi-medium data itself to a great extent, has overturned people's's in the eyes of " seeing is believing " traditional concept for a long time.How to realize the popular research topic in content integrity authentication the becoming multi-media information security field of digital picture.
Image digital watermark is a kind of image integrity commonly used authentication and copyright protection technology.As number of patent application is 200610036388.6 to have announced " a kind of reversible water mark method that is used for image authentication ", high-frequency sub-band histogram by revising image is with the SHA-256 cryptographic hash of original image and be used for the image data recovered and embed high-frequency sub-band, by the lowest bit plane of replacing low frequency sub-band significant watermark is embedded low frequency sub-band, distort detection and location according to the watermark of watermark of extracting or extraction and the differential chart of former watermark, relatively the cryptographic hash of cryptographic hash of Ti Quing and image restored is carried out the content integrity checking.Yet, use traditional digital watermark, need algorithm for design that watermark information is embedded in the original artwork, if containing much information of embedding influences visual effect; If the quantity of information that embeds is little, then relatively be easy to extract, do not reach the security of expection.So, not only when embedding and extract, increased computation complexity, and, in image, embedded watermark, changed the raw information of image, destroyed the integrality of original artwork to a certain extent.Therefore, how neither embedding any information in image, can realize content integrity authentication and copyright protection to original artwork again, is a challenging research topic.
In order to address this problem, people such as Chuen-Ching Wang have proposed a New Scheme of Image Watermarking of learning (Visual Cryptography) based on visual cryptography, its basic thought is different from traditional watermarking project, no longer need watermark is embedded in the original image, but utilize secret (the VSS:Visual secret sharing) technology of sharing of vision that watermarking images is divided into two parts, the information of wherein a part of watermark is combined with the main information of original image, obtain an image that contains watermark; The recovery stage is to recover that a part of watermark information from the image that contains watermark, overlaps on another part watermark information, thus the entitlement of authentication image.Philtrums such as Hsieh have proposed a gray level image copyright protection scheme of sharing based on secret; this scheme is utilized wavelet transform to extract the feature of original image and it is combined with watermark information; generate the shadow image, do not need to design the embedding algorithm of watermark equally.2005, they expanded to the coloured image copyright protection to this method again.Above scheme need not embed any information in original artwork, can realize image copyright protection, compares with traditional water mark method, has reduced computation complexity and has kept the integrality of original image.But above method all can only realize copyright protection, does not have the integrated authentication function of image.In addition, also there is shortcoming in various degree respectively, people's such as Chuen-Ching Wang operation is carried out on the spatial domain, its shortcoming is a little less than the image processing operations robustness to routine, people's such as Hsieh method all is on transform domain image to be handled, but the algorithm more complicated, its method has expanded to the coloured image copyright protection, also just simply gray level image has been extended to coloured image, has not significantly upgraded on the algorithm; And the method in the coloured image copyright protection need become YCbCr with the RGB mode switch of coloured image.
Summary of the invention
The purpose of this invention is to provide a kind of based on the secret picture material altering detecting method of sharing of vision, utilize the copyright information of image to generate watermarking images, do not need watermark embedding and watermark extracting, but utilize the secret technology of sharing of vision, raw image data is not being produced under the prerequisite of any destruction, realizing the detection of distorting simultaneously picture material.
The technical solution adopted in the present invention is that a kind of picture material altering detecting method of sharing based on the vision secret may further comprise the steps:
Information sender:
Step 2, utilize original image I
0Copyright information generate original watermark image W
0, encrypt original watermark image W with cryptographic algorithm again
0, generate encrypted watermark image W
E
The receiving party:
Step 5, the detected image feature F that utilizes step 4 to obtain
tAnd the encrypted watermark image W that obtains of step 2
E, generate detection shadow S by algorithm Algorithm 4
2
Step 6, the checking shadow S that utilizes step 3 to obtain
1And the detection shadow S that obtains of step 5
2,, generate recovery watermarking images W by watermark recovery algorithm Algorithm 5
R
Step 7, the recovery watermarking images W that utilizes decipherment algorithm decryption step 6 to obtain
R, generate and detect watermarking images W
D
Step 8, the detection watermarking images W that step 7 is obtained
DThe original watermark image W that obtains with step 2
0Compare, if detect watermarking images W
DWith original watermark image W
0Visual effect is identical, then shows test pattern I
tBe by original image I
0Through obtaining after the normal image processing operational processes; If detect watermarking images W
DSerious distortion then shows and detects watermarking images W
DBe the image of malice after distorting, and according to watermarking images W
DTest pattern I is determined in the position of distortion
tBy the tampered region.
The invention has the beneficial effects as follows the following deficiency that has solved existing correlation technique:
(1) solved deficiency, do not needed watermarking algorithm and watermark extracting algorithm based on the image authentication method of digital watermarking, at the bottom of the computation complexity, the efficient height.
(2) raw image data is not being produced under the prerequisite of any destruction, realizing the detection of distorting simultaneously, to realize copyright protection to picture material.
(3) the present invention can directly apply to coloured image, does not need to carry out the conversion of color mode.
(4) method of the present invention for JPEG compression, image sharpening, interpolation noise, slightly rotate normal image such as convergent-divergent and handle operation and have robustness.
(5) malice is distorted have susceptibility, can determine by the position of tampered region.
(6), thereby has stronger practicality because method of the present invention has higher security and efficient.
Description of drawings
Fig. 1 is the process flow diagram that the present invention is based on the secret picture material altering detecting method of sharing of vision;
Fig. 2 is that quality factor is the image that obtains in the content tampering testing process of 20 jpeg compressed image, and wherein, a is original image I
0, b is original watermark image W
0, c is encrypted watermark image W
E, d is checking shadow S
1, e is for detecting shadow S
2, f is for recovering watermarking images W
R, g is test pattern I
t, h is for detecting watermarking images W
D
Fig. 3 is that quality factor is the image that obtains in the content tampering testing process of 60 jpeg compressed image, and wherein, a is original image I
0, b is original watermark image W
0, c is encrypted watermark image W
E, d is checking shadow S
1, e is for detecting shadow S
2, f is for recovering watermarking images W
R, g is test pattern I
t, h is for detecting watermarking images W
D
Fig. 4 is the content tampering detection figure at gray level image, and a is test pattern I
t, b is the tampering location result;
Fig. 5 is the content tampering detection figure at coloured image, and a is test pattern I
t, b is the tampering location result.
Embodiment
The present invention is described in detail below in conjunction with the drawings and specific embodiments.
As shown in Figure 1, the present invention is a kind of based on the secret picture material altering detecting method of sharing of vision, may further comprise the steps:
Information sender:
Wherein, the feature extraction algorithm Algorithm in the step 11 is:
The original image I of the N * N of input
0Be divided into 8 * 8 not overlapping block, obtain N
2/ 64 image blocks are expressed as I
Ij, i=1 wherein, 2 ..., N/8, j=1,2 ..., N/8; Each image block is carried out 3 grades of db1 wavelet decomposition, obtain the LL of each 8 * 8 image block
3Subband wavelet coefficient a
Ij(i=1,2 ..., N/8, j=1,2 ..., N/8), generate original image feature F
0:
Step 2, utilize original image I
0Copyright information generate original watermark image W
0, encrypt original watermark image W with cryptographic algorithm Algorithm 2 again
0, generate encrypted watermark image W
E
Cryptographic algorithm Algorithm 2 in the step 2 is:
Wherein, utilize original image I
0Copyright information generate the original watermark image W of N/8 * N/8
0, construct a N/8-rank magic square matrix, through K (K<(N/8)
2) after the magic square conversion, obtain encrypted watermark image W
EWherein, K is given watermark keys, encrypted watermark image W
EBe a binary matrix:
Wherein, the cryptographic algorithm Algorithm in the step 33 is:
At first, the characteristics of image F that obtains of calculation procedure 1
0Average M
0:
Secondly,
Wherein, n=N/8, algorithm " e
1" definition rule be:
w ij=1 | w ij=0 | |
a ij<M 0 | s ij=1 | s ij=0 |
a ij>M 0 | s ij=0 | s ij=1 |
The receiving party:
Wherein, the algorithm Algorithm in the step 41 is:
The test pattern I of the N * N that receives
tBe divided into 8 * 8 not overlapping block, obtain N
2/ 64 image blocks carry out 3 grades of db1 wavelet decomposition to each image block, obtain the LL of each 8 * 8 image block
3Subband wavelet coefficient b
Ij(i=1,2 ..., N/8, j=1,2 ..., N/8), generate detected image feature F
t:
Step 5, the detected image feature F that utilizes step 4 to obtain
tAnd the encrypted watermark image W that obtains of step 2
E,, generate detection shadow S by algorithm Algorithm 4
2
Wherein, the algorithm Algorithm in the step 54 is:
At first, the detected image feature F that obtains of calculation procedure 4
tAverage M
t:
Secondly,
Wherein, n=N/8, algorithm " e
2" definition rule be:
w ij=1 | w ij=0 | |
b ij<M t | t ij=0 | t ij=0 |
b ij>M t | t ij=1 | t ij=1 |
Step 6, the checking shadow S that utilizes step 3 to obtain
1And the detection shadow S that obtains of step 5
2,, generate recovery watermarking images W by watermark recovery algorithm Algorithm 5
R
Wherein, the watermark recovery algorithm Algorithm 5 in the step 6 is:
Wherein, n=N/8, algorithm " e
3" definition rule be:
s ij | t ij | s ij?e 3?t ij |
0 | 1 | 1 |
1 | 0 | 1 |
1 | 1 | 0 |
0 | 0 | 0 |
Step 7, the recovery watermarking images W that utilizes decipherment algorithm Algorithm 6 decryption step 6 to obtain
R, generate and detect watermarking images W
D
Wherein, the decipherment algorithm Algorithm in the step 76 is: utilize watermarking images W
RConstruct a N/8-rank magic square matrix, carry out K contrary magic square conversion.
Step 8, the detection watermarking images W that step 7 is obtained
DThe original watermark image W that obtains with step 2
0Compare: if detect watermarking images W
DWith original watermark image W
0Visual effect is identical, then shows test pattern I
tBe by original image I
0Through obtaining after the normal image processing operational processes; If detect watermarking images W
DSerious distortion then shows and detects watermarking images W
DBe the image of malice after distorting, and according to watermarking images W
DTest pattern I is determined in the position of distortion
tBy the tampered region.
As shown in the table is the comparison of method of the present invention and existing technologies:
In last table, the function that " √ " expression algorithm has; The function that " * " expression algorithm does not have.As can be seen, method of the present invention also has the positioning function in the field of distorting except the function that has existing technologies and have.
As shown in Figure 2, be that quality factor is the image that obtains in the content tampering testing process of 20 jpeg compressed image.Fig. 3 is that quality factor is the image that obtains in the content tampering testing process of 60 jpeg compressed image, and in Fig. 2 and Fig. 3, a is given original image I
0B is the original watermark image W that step 2 generates
0C is the encrypted watermark image W that step 2 generates
ED is the checking shadow S that step 3 generates
1E is the detection shadow S that step 5 generates
2F is the recovery watermarking images W that step 6 generates
RG is test pattern I
t, h is the detection watermarking images W that step 7 generates
DThe picture material that draws Fig. 2 and Fig. 3 by comparison b and h is distorted test result and is: test pattern I
tBe by original image I
0Through obtaining after the normal image processing operational processes.
Fig. 4 is the content tampering detection figure at gray level image, and a is test pattern I
t, b is the tampering location result.Fig. 5 is the content tampering detection figure at coloured image, and a is test pattern I
t, b is the tampering location result.
Claims (5)
1. one kind based on the secret picture material altering detecting method of sharing of vision, it is characterized in that may further comprise the steps:
Information sender:
Step 1, for given original image I
0, extract original image feature F with feature extraction algorithm
0
Step 2, utilize original image I
0Copyright information generate original watermark image W
0, encrypt original watermark image W with cryptographic algorithm again
0, generate encrypted watermark image W
E
Step 3, the original image feature F that utilizes step 1 to obtain
0And the encrypted watermark image W that obtains of step 2
E, generate checking shadow S by cryptographic algorithm Algorithm 3
1, wherein, described cryptographic algorithm Algorithm 3 is:
At first, the characteristics of image F that obtains of calculation procedure 1
0Average M
0:
Secondly,
Wherein, n=N/8, algorithm " e
1" definition rule be:
;
The receiving party:
Step 4, for the test pattern I that receives
t, extract detected image feature F with feature extraction algorithm
t
Step 5, the detected image feature F that utilizes step 4 to obtain
tAnd the encrypted watermark image W that obtains of step 2
E, generate detection shadow S by algorithm Algorithm 4
2, wherein, described algorithm Algorithm4 is:
At first, the detected image feature F that obtains of calculation procedure 4
tAverage M
t:
Secondly,
Wherein, n=N/8, algorithm " e
2" definition rule be:
;
Step 6, the checking shadow S that utilizes step 3 to obtain
1And the detection shadow S that obtains of step 5
2,, generate recovery watermarking images W by watermark recovery algorithm Algorithm 5
R, wherein, described step watermark recovery algorithm Algorithm 5 is:
Wherein, n=N/8, algorithm " e
3" definition rule be:
;
Step 7, the recovery watermarking images W that utilizes decipherment algorithm decryption step 6 to obtain
R, generate and detect watermarking images W
D
Step 8, the detection watermarking images W that step 7 is obtained
DThe original watermark image W that obtains with step 2
0Compare, if detect watermarking images W
DWith original watermark image W
0Visual effect is identical, then shows test pattern I
tBe by original image I
0Through obtaining after the normal image processing operational processes; If detect watermarking images W
DSerious distortion then shows and detects watermarking images W
DBe the image of malice after distorting, and according to watermarking images W
DTest pattern I is determined in the position of distortion
tBy the tampered region.
2. described based on the secret picture material altering detecting method of sharing of vision according to claim 1, it is characterized in that the feature extraction algorithm in the described step 1 is:
The original image I of the N * N of input
0Be divided into 8 * 8 not overlapping block, obtain N
2/ 64 image blocks are expressed as I
Ij, i=1 wherein, 2 ..., N/8, j=1,2 ..., N/8; Each image block is carried out 3 grades of db1 wavelet decomposition, obtain the LL of each 8 * 8 image block
3Subband wavelet coefficient a
Ij(i=1,2 ..., N/8, j=1,2 ..., N/8), generate original image feature F
0:
3. described based on the secret picture material altering detecting method of sharing of vision according to claim 1, it is characterized in that the cryptographic algorithm in the described step 2 is:
Utilize original image I
0Copyright information generate the original watermark image W of N/8 * N/8
0, construct a N/8-rank magic square matrix, through after K the magic square conversion, obtain encrypted watermark image W
EWherein, K is given watermark keys, K<(N/8)
2, encrypted watermark image W
EBe a binary matrix:
4. described based on the secret picture material altering detecting method of sharing of vision according to claim 1, it is characterized in that the feature extraction algorithm in the described step 4 is:
The test pattern I of the N * N that receives
tBe divided into 8 * 8 not overlapping block, obtain N
2/ 64 image blocks carry out 3 grades of db1 wavelet decomposition to each image block, obtain the LL of each 8 * 8 image block
3Subband wavelet coefficient b
Ij, wherein, i=1,2 ..., N/8, j=1,2 ..., N/8 generates detected image feature F
t:
5. described based on the secret picture material altering detecting method of sharing of vision according to claim 1, it is characterized in that the decipherment algorithm in the described step 7 is: utilize watermarking images W
RConstruct a N/8-rank magic square matrix, carry out K contrary magic square conversion, wherein, K is given watermark keys, K<(N/8)
2
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100564119A CN102142129B (en) | 2011-03-09 | 2011-03-09 | Visual secret sharing-based image content tampering detection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100564119A CN102142129B (en) | 2011-03-09 | 2011-03-09 | Visual secret sharing-based image content tampering detection method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102142129A true CN102142129A (en) | 2011-08-03 |
CN102142129B CN102142129B (en) | 2012-07-04 |
Family
ID=44409618
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011100564119A Expired - Fee Related CN102142129B (en) | 2011-03-09 | 2011-03-09 | Visual secret sharing-based image content tampering detection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102142129B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104869432A (en) * | 2015-05-14 | 2015-08-26 | 邓家先 | Multi-resolution compression encryption and grading decryption and display method for image |
CN106126978A (en) * | 2016-06-30 | 2016-11-16 | 中南大学 | The lossless digital copyright management method of eye fundus image based on fingerprint Yu zero watermarking mixed architecture |
CN107070638A (en) * | 2017-04-20 | 2017-08-18 | 上海海洋大学 | A kind of ocean remote sensing image privacy sharing method of dynamic weighting thresholding |
CN110278074A (en) * | 2018-03-16 | 2019-09-24 | 临沂大学 | A kind of visualization secret sharing scheme for Image Sharing encryption |
CN110602349A (en) * | 2019-08-27 | 2019-12-20 | 成都信息工程大学 | Method for security protection of associated image content |
CN113327105A (en) * | 2021-08-03 | 2021-08-31 | 杭州志卓科技股份有限公司 | B2B online payment transaction method based on digital image processing |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010046307A1 (en) * | 1998-04-30 | 2001-11-29 | Hewlett-Packard Company | Method and apparatus for digital watermarking of images |
US20030070075A1 (en) * | 2001-10-04 | 2003-04-10 | Frederic Deguillaume | Secure hybrid robust watermarking resistant against tampering and copy-attack |
CN1440196A (en) * | 2003-04-03 | 2003-09-03 | 上海交通大学 | Digital watermark implanting and extracting method based on parth search |
CN101567958A (en) * | 2009-05-19 | 2009-10-28 | 杭州海康威视软件有限公司 | Semi-fragile digital watermaking system based on non-redundant Contourlet conversion |
CN101866477A (en) * | 2010-06-11 | 2010-10-20 | 山东大学 | Digital blind watermarking method for double protection of image integrity |
-
2011
- 2011-03-09 CN CN2011100564119A patent/CN102142129B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010046307A1 (en) * | 1998-04-30 | 2001-11-29 | Hewlett-Packard Company | Method and apparatus for digital watermarking of images |
US20030070075A1 (en) * | 2001-10-04 | 2003-04-10 | Frederic Deguillaume | Secure hybrid robust watermarking resistant against tampering and copy-attack |
CN1440196A (en) * | 2003-04-03 | 2003-09-03 | 上海交通大学 | Digital watermark implanting and extracting method based on parth search |
CN101567958A (en) * | 2009-05-19 | 2009-10-28 | 杭州海康威视软件有限公司 | Semi-fragile digital watermaking system based on non-redundant Contourlet conversion |
CN101866477A (en) * | 2010-06-11 | 2010-10-20 | 山东大学 | Digital blind watermarking method for double protection of image integrity |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104869432A (en) * | 2015-05-14 | 2015-08-26 | 邓家先 | Multi-resolution compression encryption and grading decryption and display method for image |
CN104869432B (en) * | 2015-05-14 | 2017-10-27 | 邓家先 | A kind of image multiresolution compression encryption and classification decryption and display methods |
CN106126978A (en) * | 2016-06-30 | 2016-11-16 | 中南大学 | The lossless digital copyright management method of eye fundus image based on fingerprint Yu zero watermarking mixed architecture |
CN106126978B (en) * | 2016-06-30 | 2018-10-19 | 中南大学 | The lossless digital copyright management method of eye fundus image based on fingerprint Yu zero watermarking mixed architecture |
CN107070638A (en) * | 2017-04-20 | 2017-08-18 | 上海海洋大学 | A kind of ocean remote sensing image privacy sharing method of dynamic weighting thresholding |
CN107070638B (en) * | 2017-04-20 | 2020-06-23 | 上海海洋大学 | Ocean remote sensing image secret sharing method of dynamic weighting threshold |
CN110278074A (en) * | 2018-03-16 | 2019-09-24 | 临沂大学 | A kind of visualization secret sharing scheme for Image Sharing encryption |
CN110278074B (en) * | 2018-03-16 | 2022-11-11 | 临沂大学 | Visual secret sharing method for image encryption |
CN110602349A (en) * | 2019-08-27 | 2019-12-20 | 成都信息工程大学 | Method for security protection of associated image content |
CN110602349B (en) * | 2019-08-27 | 2021-07-02 | 成都信息工程大学 | Method for security protection of associated image content |
CN113327105A (en) * | 2021-08-03 | 2021-08-31 | 杭州志卓科技股份有限公司 | B2B online payment transaction method based on digital image processing |
Also Published As
Publication number | Publication date |
---|---|
CN102142129B (en) | 2012-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chang et al. | A secure fragile watermarking scheme based on chaos-and-hamming code | |
Haghighi et al. | TRLH: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique | |
Xuehua | Digital watermarking and its application in image copyright protection | |
Lee et al. | Dual watermark for image tamper detection and recovery | |
CN102142129B (en) | Visual secret sharing-based image content tampering detection method | |
Azeroual et al. | Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet | |
Hadmi et al. | Perceptual image hashing | |
Hu et al. | Dual-wrapped digital watermarking scheme for image copyright protection | |
CN102208097A (en) | Network image copyright real-time distinguishing method | |
CN104063731A (en) | Two-dimension code anti-counterfeiting printing and verification method adopting digital watermark technology | |
CN103700059B (en) | The cloud storage view data property held method of proof based on multifunction digital watermark | |
Yuan et al. | Gauss–Jordan elimination-based image tampering detection and self-recovery | |
CN102073978B (en) | Method and system for identifying and recovering digital images by utilizing irregular region segmentation | |
Ni et al. | Pinpoint authentication watermarking based on a chaotic system | |
Pan et al. | A lossless watermarking scheme for halftone image authentication | |
Sethi et al. | Video security against deepfakes and other forgeries | |
Kaur et al. | XOR-EDGE based video steganography and testing against chi-square steganalysis | |
Riaz et al. | Image authentication and restoration by multiple watermarking techniques with advance encryption standard in digital photography | |
Shukla | Non-separable histogram based reversible data hiding approach using inverse S-order and skew tent map | |
CN103617589A (en) | Information hiding method based on local histogram | |
Mathivadhani et al. | Digital watermarking and information hiding using wavelets, SLSB and Visual cryptography method | |
Sumalatha et al. | Local content based image authentication for tamper localization | |
Bhattacharyya et al. | Watermarking Using Multiresolution Cosine Transformation: A Review | |
Latha et al. | An efficient wavelet transform based steganography technique using chaotic map | |
Mehta et al. | Biometric data security using joint encryption and watermarking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120704 Termination date: 20150309 |
|
EXPY | Termination of patent right or utility model |