CN102142129A - Visual secret sharing-based image content tampering detection method - Google Patents

Visual secret sharing-based image content tampering detection method Download PDF

Info

Publication number
CN102142129A
CN102142129A CN 201110056411 CN201110056411A CN102142129A CN 102142129 A CN102142129 A CN 102142129A CN 201110056411 CN201110056411 CN 201110056411 CN 201110056411 A CN201110056411 A CN 201110056411A CN 102142129 A CN102142129 A CN 102142129A
Authority
CN
China
Prior art keywords
image
algorithm
watermark
original
watermarking images
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 201110056411
Other languages
Chinese (zh)
Other versions
CN102142129B (en
Inventor
王晓峰
王尚平
张亚玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Technology
Original Assignee
Xian University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Technology filed Critical Xian University of Technology
Priority to CN2011100564119A priority Critical patent/CN102142129B/en
Publication of CN102142129A publication Critical patent/CN102142129A/en
Application granted granted Critical
Publication of CN102142129B publication Critical patent/CN102142129B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a visual secret sharing-based image content tampering detection method. The method comprises the following steps of: generating a watermarking image by using copyright information of the image; generating a verification shadow and a detection shadow by combining the content characteristic of the image; recovering a water mark from the verification shadow and the detection shadow by using a visual secret sharing technology; and comparing the recovered water mark with the original watermarking to determine whether the image is tampered so as to realize tampering detection and determine the position of a tampered region. In the method, the watermarking image is generated by using the copyright information of the image without embedding and extracting the watermarking, but the tampering detection of image content is realized by using the visual secret sharing technology on the premise of not damaging the original image data.

Description

A kind of based on the secret picture material altering detecting method of sharing of vision
Technical field
The invention belongs to the multi-media information security technical field, be specifically related to a kind of based on the secret picture material altering detecting method of sharing of vision.
Background technology
Along with developing rapidly of network technology and digitizing technique, the interchange of multimedia messages has reached unprecedented range.The application of the development of while image processing techniques and powerful image editing software makes domestic consumer can edit, distort raw image data easily, makes the effect of mixing the spurious with the genuine.This has reduced the credibility of multi-medium data itself to a great extent, has overturned people's's in the eyes of " seeing is believing " traditional concept for a long time.How to realize the popular research topic in content integrity authentication the becoming multi-media information security field of digital picture.
Image digital watermark is a kind of image integrity commonly used authentication and copyright protection technology.As number of patent application is 200610036388.6 to have announced " a kind of reversible water mark method that is used for image authentication ", high-frequency sub-band histogram by revising image is with the SHA-256 cryptographic hash of original image and be used for the image data recovered and embed high-frequency sub-band, by the lowest bit plane of replacing low frequency sub-band significant watermark is embedded low frequency sub-band, distort detection and location according to the watermark of watermark of extracting or extraction and the differential chart of former watermark, relatively the cryptographic hash of cryptographic hash of Ti Quing and image restored is carried out the content integrity checking.Yet, use traditional digital watermark, need algorithm for design that watermark information is embedded in the original artwork, if containing much information of embedding influences visual effect; If the quantity of information that embeds is little, then relatively be easy to extract, do not reach the security of expection.So, not only when embedding and extract, increased computation complexity, and, in image, embedded watermark, changed the raw information of image, destroyed the integrality of original artwork to a certain extent.Therefore, how neither embedding any information in image, can realize content integrity authentication and copyright protection to original artwork again, is a challenging research topic.
In order to address this problem, people such as Chuen-Ching Wang have proposed a New Scheme of Image Watermarking of learning (Visual Cryptography) based on visual cryptography, its basic thought is different from traditional watermarking project, no longer need watermark is embedded in the original image, but utilize secret (the VSS:Visual secret sharing) technology of sharing of vision that watermarking images is divided into two parts, the information of wherein a part of watermark is combined with the main information of original image, obtain an image that contains watermark; The recovery stage is to recover that a part of watermark information from the image that contains watermark, overlaps on another part watermark information, thus the entitlement of authentication image.Philtrums such as Hsieh have proposed a gray level image copyright protection scheme of sharing based on secret; this scheme is utilized wavelet transform to extract the feature of original image and it is combined with watermark information; generate the shadow image, do not need to design the embedding algorithm of watermark equally.2005, they expanded to the coloured image copyright protection to this method again.Above scheme need not embed any information in original artwork, can realize image copyright protection, compares with traditional water mark method, has reduced computation complexity and has kept the integrality of original image.But above method all can only realize copyright protection, does not have the integrated authentication function of image.In addition, also there is shortcoming in various degree respectively, people's such as Chuen-Ching Wang operation is carried out on the spatial domain, its shortcoming is a little less than the image processing operations robustness to routine, people's such as Hsieh method all is on transform domain image to be handled, but the algorithm more complicated, its method has expanded to the coloured image copyright protection, also just simply gray level image has been extended to coloured image, has not significantly upgraded on the algorithm; And the method in the coloured image copyright protection need become YCbCr with the RGB mode switch of coloured image.
Summary of the invention
The purpose of this invention is to provide a kind of based on the secret picture material altering detecting method of sharing of vision, utilize the copyright information of image to generate watermarking images, do not need watermark embedding and watermark extracting, but utilize the secret technology of sharing of vision, raw image data is not being produced under the prerequisite of any destruction, realizing the detection of distorting simultaneously picture material.
The technical solution adopted in the present invention is that a kind of picture material altering detecting method of sharing based on the vision secret may further comprise the steps:
Information sender:
Step 1, for given original image I 0, extract original image feature F with feature extraction algorithm 0
Step 2, utilize original image I 0Copyright information generate original watermark image W 0, encrypt original watermark image W with cryptographic algorithm again 0, generate encrypted watermark image W E
Step 3, the original image feature F that utilizes step 1 to obtain 0And the encrypted watermark image W that obtains of step 2 E, generate checking shadow S by cryptographic algorithm Algorithm 3 1
The receiving party:
Step 4, for the test pattern I that receives t, extract detected image feature F with feature extraction algorithm t
Step 5, the detected image feature F that utilizes step 4 to obtain tAnd the encrypted watermark image W that obtains of step 2 E, generate detection shadow S by algorithm Algorithm 4 2
Step 6, the checking shadow S that utilizes step 3 to obtain 1And the detection shadow S that obtains of step 5 2,, generate recovery watermarking images W by watermark recovery algorithm Algorithm 5 R
Step 7, the recovery watermarking images W that utilizes decipherment algorithm decryption step 6 to obtain R, generate and detect watermarking images W D
Step 8, the detection watermarking images W that step 7 is obtained DThe original watermark image W that obtains with step 2 0Compare, if detect watermarking images W DWith original watermark image W 0Visual effect is identical, then shows test pattern I tBe by original image I 0Through obtaining after the normal image processing operational processes; If detect watermarking images W DSerious distortion then shows and detects watermarking images W DBe the image of malice after distorting, and according to watermarking images W DTest pattern I is determined in the position of distortion tBy the tampered region.
The invention has the beneficial effects as follows the following deficiency that has solved existing correlation technique:
(1) solved deficiency, do not needed watermarking algorithm and watermark extracting algorithm based on the image authentication method of digital watermarking, at the bottom of the computation complexity, the efficient height.
(2) raw image data is not being produced under the prerequisite of any destruction, realizing the detection of distorting simultaneously, to realize copyright protection to picture material.
(3) the present invention can directly apply to coloured image, does not need to carry out the conversion of color mode.
(4) method of the present invention for JPEG compression, image sharpening, interpolation noise, slightly rotate normal image such as convergent-divergent and handle operation and have robustness.
(5) malice is distorted have susceptibility, can determine by the position of tampered region.
(6), thereby has stronger practicality because method of the present invention has higher security and efficient.
Description of drawings
Fig. 1 is the process flow diagram that the present invention is based on the secret picture material altering detecting method of sharing of vision;
Fig. 2 is that quality factor is the image that obtains in the content tampering testing process of 20 jpeg compressed image, and wherein, a is original image I 0, b is original watermark image W 0, c is encrypted watermark image W E, d is checking shadow S 1, e is for detecting shadow S 2, f is for recovering watermarking images W R, g is test pattern I t, h is for detecting watermarking images W D
Fig. 3 is that quality factor is the image that obtains in the content tampering testing process of 60 jpeg compressed image, and wherein, a is original image I 0, b is original watermark image W 0, c is encrypted watermark image W E, d is checking shadow S 1, e is for detecting shadow S 2, f is for recovering watermarking images W R, g is test pattern I t, h is for detecting watermarking images W D
Fig. 4 is the content tampering detection figure at gray level image, and a is test pattern I t, b is the tampering location result;
Fig. 5 is the content tampering detection figure at coloured image, and a is test pattern I t, b is the tampering location result.
Embodiment
The present invention is described in detail below in conjunction with the drawings and specific embodiments.
As shown in Figure 1, the present invention is a kind of based on the secret picture material altering detecting method of sharing of vision, may further comprise the steps:
Information sender:
Step 1, for given original image I 0, extract original image feature F with feature extraction algorithm Algorithm 1 0
Wherein, the feature extraction algorithm Algorithm in the step 11 is:
The original image I of the N * N of input 0Be divided into 8 * 8 not overlapping block, obtain N 2/ 64 image blocks are expressed as I Ij, i=1 wherein, 2 ..., N/8, j=1,2 ..., N/8; Each image block is carried out 3 grades of db1 wavelet decomposition, obtain the LL of each 8 * 8 image block 3Subband wavelet coefficient a Ij(i=1,2 ..., N/8, j=1,2 ..., N/8), generate original image feature F 0:
F 0 = a 11 . . . a 1 n . . . . . . . . . a n 1 . . . a nn , N=N/8 wherein.
Step 2, utilize original image I 0Copyright information generate original watermark image W 0, encrypt original watermark image W with cryptographic algorithm Algorithm 2 again 0, generate encrypted watermark image W E
Cryptographic algorithm Algorithm 2 in the step 2 is:
Wherein, utilize original image I 0Copyright information generate the original watermark image W of N/8 * N/8 0, construct a N/8-rank magic square matrix, through K (K<(N/8) 2) after the magic square conversion, obtain encrypted watermark image W EWherein, K is given watermark keys, encrypted watermark image W EBe a binary matrix:
W E = w 11 . . . w 1 n . . . . . . . . . w n 1 . . . w nn , N=N/8 wherein, w Ij∈ (0,1).
Step 3, the original image feature F that utilizes step 1 to obtain 0And the encrypted watermark image W that obtains of step 2 E,, generate checking shadow S by cryptographic algorithm Algorithm 3 1
Wherein, the cryptographic algorithm Algorithm in the step 33 is:
At first, the characteristics of image F that obtains of calculation procedure 1 0Average M 0: M 0 = a 11 + . . . + a 1 ( N / 8 ) + . . . + a ( N / 8 ) 1 + . . . + a ( N / 8 ) ( N / 8 ) ( N / 8 ) × ( N / 8 ) ;
Secondly, S 1 = s 11 . . . s 1 n . . . . . . . . . s n 1 . . . s nn = F 0 e 1 W E = a 11 e 1 w 11 . . . a 1 n e 1 w 1 n . . . . . . . . . a n 1 e 1 w n 1 . . . a nn e 1 w nn
Wherein, n=N/8, algorithm " e 1" definition rule be:
w ij=1 w ij=0
a ij<M 0 s ij=1 s ij=0
a ij>M 0 s ij=0 s ij=1
The receiving party:
Step 4, for the test pattern I that receives t, extract detected image feature F with feature extraction algorithm Algorithm 1 t
Wherein, the algorithm Algorithm in the step 41 is:
The test pattern I of the N * N that receives tBe divided into 8 * 8 not overlapping block, obtain N 2/ 64 image blocks carry out 3 grades of db1 wavelet decomposition to each image block, obtain the LL of each 8 * 8 image block 3Subband wavelet coefficient b Ij(i=1,2 ..., N/8, j=1,2 ..., N/8), generate detected image feature F t:
F t = b 11 . . . b 1 n . . . . . . . . . b n 1 . . . b nn , N=N/8 wherein.
Step 5, the detected image feature F that utilizes step 4 to obtain tAnd the encrypted watermark image W that obtains of step 2 E,, generate detection shadow S by algorithm Algorithm 4 2
Wherein, the algorithm Algorithm in the step 54 is:
At first, the detected image feature F that obtains of calculation procedure 4 tAverage M t: M t = b 11 + . . . + b 1 ( N / 8 ) + . . . + b ( N / 8 ) 1 + . . . + b ( N / 8 ) ( N / 8 ) ( N / 8 ) × ( N / 8 ) ;
Secondly, S 2 = t 11 . . . t 1 n . . . . . . . . . t n 1 . . . t nn = F t e 2 W E = b 11 e 2 w 11 . . . b 1 n e 2 w 1 n . . . . . . . . . b n 1 e 2 w n 1 . . . b nn e 2 w nn ,
Wherein, n=N/8, algorithm " e 2" definition rule be:
w ij=1 w ij=0
b ij<M t t ij=0 t ij=0
b ij>M t t ij=1 t ij=1
Step 6, the checking shadow S that utilizes step 3 to obtain 1And the detection shadow S that obtains of step 5 2,, generate recovery watermarking images W by watermark recovery algorithm Algorithm 5 R
Wherein, the watermark recovery algorithm Algorithm 5 in the step 6 is:
W R = w R 11 . . . w R 1 n . . . . . . . . . w Rn 1 . . . w Rnn = S 1 e 3 S 2 = s 11 e 3 t 11 . . . s 1 n e 3 t 1 n . . . . . . . . . s n 1 e 3 t n 1 . . . s nn e 3 t nn ,
Wherein, n=N/8, algorithm " e 3" definition rule be:
s ij t ij s ij?e 3?t ij
0 1 1
1 0 1
1 1 0
0 0 0
Step 7, the recovery watermarking images W that utilizes decipherment algorithm Algorithm 6 decryption step 6 to obtain R, generate and detect watermarking images W D
Wherein, the decipherment algorithm Algorithm in the step 76 is: utilize watermarking images W RConstruct a N/8-rank magic square matrix, carry out K contrary magic square conversion.
Step 8, the detection watermarking images W that step 7 is obtained DThe original watermark image W that obtains with step 2 0Compare: if detect watermarking images W DWith original watermark image W 0Visual effect is identical, then shows test pattern I tBe by original image I 0Through obtaining after the normal image processing operational processes; If detect watermarking images W DSerious distortion then shows and detects watermarking images W DBe the image of malice after distorting, and according to watermarking images W DTest pattern I is determined in the position of distortion tBy the tampered region.
As shown in the table is the comparison of method of the present invention and existing technologies:
Figure BDA0000049451610000081
In last table, the function that " √ " expression algorithm has; The function that " * " expression algorithm does not have.As can be seen, method of the present invention also has the positioning function in the field of distorting except the function that has existing technologies and have.
As shown in Figure 2, be that quality factor is the image that obtains in the content tampering testing process of 20 jpeg compressed image.Fig. 3 is that quality factor is the image that obtains in the content tampering testing process of 60 jpeg compressed image, and in Fig. 2 and Fig. 3, a is given original image I 0B is the original watermark image W that step 2 generates 0C is the encrypted watermark image W that step 2 generates ED is the checking shadow S that step 3 generates 1E is the detection shadow S that step 5 generates 2F is the recovery watermarking images W that step 6 generates RG is test pattern I t, h is the detection watermarking images W that step 7 generates DThe picture material that draws Fig. 2 and Fig. 3 by comparison b and h is distorted test result and is: test pattern I tBe by original image I 0Through obtaining after the normal image processing operational processes.
Fig. 4 is the content tampering detection figure at gray level image, and a is test pattern I t, b is the tampering location result.Fig. 5 is the content tampering detection figure at coloured image, and a is test pattern I t, b is the tampering location result.

Claims (5)

1. one kind based on the secret picture material altering detecting method of sharing of vision, it is characterized in that may further comprise the steps:
Information sender:
Step 1, for given original image I 0, extract original image feature F with feature extraction algorithm 0
Step 2, utilize original image I 0Copyright information generate original watermark image W 0, encrypt original watermark image W with cryptographic algorithm again 0, generate encrypted watermark image W E
Step 3, the original image feature F that utilizes step 1 to obtain 0And the encrypted watermark image W that obtains of step 2 E, generate checking shadow S by cryptographic algorithm Algorithm 3 1, wherein, described cryptographic algorithm Algorithm 3 is:
At first, the characteristics of image F that obtains of calculation procedure 1 0Average M 0: M 0 = a 11 + . . . + a 1 ( N / 8 ) + . . . + a ( N / 8 ) 1 + . . . + a ( N / 8 ) ( N / 8 ) ( N / 8 ) × ( N / 8 ) ;
Secondly, S 1 = s 11 . . . s 1 n . . . . . . . . . s n 1 . . . s nn = F 0 e 1 W E = a 11 e 1 w 11 . . . a 1 n e 1 w 1 n . . . . . . . . . a n 1 e 1 w n 1 . . . a nn e 1 w nn
Wherein, n=N/8, algorithm " e 1" definition rule be:
w ij=1 w ij=0 a ij<M 0 s ij=1 s ij=0 a ij>M 0 s ij=0 s ij=1
The receiving party:
Step 4, for the test pattern I that receives t, extract detected image feature F with feature extraction algorithm t
Step 5, the detected image feature F that utilizes step 4 to obtain tAnd the encrypted watermark image W that obtains of step 2 E, generate detection shadow S by algorithm Algorithm 4 2, wherein, described algorithm Algorithm4 is:
At first, the detected image feature F that obtains of calculation procedure 4 tAverage M t: M t = b 11 + . . . + b 1 ( N / 8 ) + . . . + b ( N / 8 ) 1 + . . . + b ( N / 8 ) ( N / 8 ) ( N / 8 ) × ( N / 8 ) ;
Secondly, S 2 = t 11 . . . t 1 n . . . . . . . . . t n 1 . . . t nn = F t e 2 W E = b 11 e 2 w 11 . . . b 1 n e 2 w 1 n . . . . . . . . . b n 1 e 2 w n 1 . . . b nn e 2 w nn ,
Wherein, n=N/8, algorithm " e 2" definition rule be:
w ij=1 w ij=0 b ij<M t t ij=0 t ij=0
b ij>M t t ij=1 t ij=1
Step 6, the checking shadow S that utilizes step 3 to obtain 1And the detection shadow S that obtains of step 5 2,, generate recovery watermarking images W by watermark recovery algorithm Algorithm 5 R, wherein, described step watermark recovery algorithm Algorithm 5 is:
W R = w R 11 . . . w R 1 n . . . . . . . . . w Rn 1 . . . w Rnn = S 1 e 3 S 2 = s 11 e 3 t 11 . . . s 1 n e 3 t 1 n . . . . . . . . . s n 1 e 3 t n 1 . . . s nn e 3 t nn ,
Wherein, n=N/8, algorithm " e 3" definition rule be:
s ij t ij s ij3t ij 0 1 1 1 0 1 1 1 0 0 0 0
Step 7, the recovery watermarking images W that utilizes decipherment algorithm decryption step 6 to obtain R, generate and detect watermarking images W D
Step 8, the detection watermarking images W that step 7 is obtained DThe original watermark image W that obtains with step 2 0Compare, if detect watermarking images W DWith original watermark image W 0Visual effect is identical, then shows test pattern I tBe by original image I 0Through obtaining after the normal image processing operational processes; If detect watermarking images W DSerious distortion then shows and detects watermarking images W DBe the image of malice after distorting, and according to watermarking images W DTest pattern I is determined in the position of distortion tBy the tampered region.
2. described based on the secret picture material altering detecting method of sharing of vision according to claim 1, it is characterized in that the feature extraction algorithm in the described step 1 is:
The original image I of the N * N of input 0Be divided into 8 * 8 not overlapping block, obtain N 2/ 64 image blocks are expressed as I Ij, i=1 wherein, 2 ..., N/8, j=1,2 ..., N/8; Each image block is carried out 3 grades of db1 wavelet decomposition, obtain the LL of each 8 * 8 image block 3Subband wavelet coefficient a Ij(i=1,2 ..., N/8, j=1,2 ..., N/8), generate original image feature F 0:
F 0 = a 11 . . . a 1 n . . . . . . . . . a n 1 . . . a nn , N=N/8 wherein.
3. described based on the secret picture material altering detecting method of sharing of vision according to claim 1, it is characterized in that the cryptographic algorithm in the described step 2 is:
Utilize original image I 0Copyright information generate the original watermark image W of N/8 * N/8 0, construct a N/8-rank magic square matrix, through after K the magic square conversion, obtain encrypted watermark image W EWherein, K is given watermark keys, K<(N/8) 2, encrypted watermark image W EBe a binary matrix:
W E = w 11 . . . w 1 n . . . . . . . . . w n 1 . . . w nn , N=N/8 wherein, w Ij∈ (0,1).
4. described based on the secret picture material altering detecting method of sharing of vision according to claim 1, it is characterized in that the feature extraction algorithm in the described step 4 is:
The test pattern I of the N * N that receives tBe divided into 8 * 8 not overlapping block, obtain N 2/ 64 image blocks carry out 3 grades of db1 wavelet decomposition to each image block, obtain the LL of each 8 * 8 image block 3Subband wavelet coefficient b Ij, wherein, i=1,2 ..., N/8, j=1,2 ..., N/8 generates detected image feature F t:
F t = b 11 . . . b 1 n . . . . . . . . . b n 1 . . . b nn , N=N/8 wherein.
5. described based on the secret picture material altering detecting method of sharing of vision according to claim 1, it is characterized in that the decipherment algorithm in the described step 7 is: utilize watermarking images W RConstruct a N/8-rank magic square matrix, carry out K contrary magic square conversion, wherein, K is given watermark keys, K<(N/8) 2
CN2011100564119A 2011-03-09 2011-03-09 Visual secret sharing-based image content tampering detection method Expired - Fee Related CN102142129B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011100564119A CN102142129B (en) 2011-03-09 2011-03-09 Visual secret sharing-based image content tampering detection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100564119A CN102142129B (en) 2011-03-09 2011-03-09 Visual secret sharing-based image content tampering detection method

Publications (2)

Publication Number Publication Date
CN102142129A true CN102142129A (en) 2011-08-03
CN102142129B CN102142129B (en) 2012-07-04

Family

ID=44409618

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100564119A Expired - Fee Related CN102142129B (en) 2011-03-09 2011-03-09 Visual secret sharing-based image content tampering detection method

Country Status (1)

Country Link
CN (1) CN102142129B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104869432A (en) * 2015-05-14 2015-08-26 邓家先 Multi-resolution compression encryption and grading decryption and display method for image
CN106126978A (en) * 2016-06-30 2016-11-16 中南大学 The lossless digital copyright management method of eye fundus image based on fingerprint Yu zero watermarking mixed architecture
CN107070638A (en) * 2017-04-20 2017-08-18 上海海洋大学 A kind of ocean remote sensing image privacy sharing method of dynamic weighting thresholding
CN110278074A (en) * 2018-03-16 2019-09-24 临沂大学 A kind of visualization secret sharing scheme for Image Sharing encryption
CN110602349A (en) * 2019-08-27 2019-12-20 成都信息工程大学 Method for security protection of associated image content
CN113327105A (en) * 2021-08-03 2021-08-31 杭州志卓科技股份有限公司 B2B online payment transaction method based on digital image processing

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010046307A1 (en) * 1998-04-30 2001-11-29 Hewlett-Packard Company Method and apparatus for digital watermarking of images
US20030070075A1 (en) * 2001-10-04 2003-04-10 Frederic Deguillaume Secure hybrid robust watermarking resistant against tampering and copy-attack
CN1440196A (en) * 2003-04-03 2003-09-03 上海交通大学 Digital watermark implanting and extracting method based on parth search
CN101567958A (en) * 2009-05-19 2009-10-28 杭州海康威视软件有限公司 Semi-fragile digital watermaking system based on non-redundant Contourlet conversion
CN101866477A (en) * 2010-06-11 2010-10-20 山东大学 Digital blind watermarking method for double protection of image integrity

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010046307A1 (en) * 1998-04-30 2001-11-29 Hewlett-Packard Company Method and apparatus for digital watermarking of images
US20030070075A1 (en) * 2001-10-04 2003-04-10 Frederic Deguillaume Secure hybrid robust watermarking resistant against tampering and copy-attack
CN1440196A (en) * 2003-04-03 2003-09-03 上海交通大学 Digital watermark implanting and extracting method based on parth search
CN101567958A (en) * 2009-05-19 2009-10-28 杭州海康威视软件有限公司 Semi-fragile digital watermaking system based on non-redundant Contourlet conversion
CN101866477A (en) * 2010-06-11 2010-10-20 山东大学 Digital blind watermarking method for double protection of image integrity

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104869432A (en) * 2015-05-14 2015-08-26 邓家先 Multi-resolution compression encryption and grading decryption and display method for image
CN104869432B (en) * 2015-05-14 2017-10-27 邓家先 A kind of image multiresolution compression encryption and classification decryption and display methods
CN106126978A (en) * 2016-06-30 2016-11-16 中南大学 The lossless digital copyright management method of eye fundus image based on fingerprint Yu zero watermarking mixed architecture
CN106126978B (en) * 2016-06-30 2018-10-19 中南大学 The lossless digital copyright management method of eye fundus image based on fingerprint Yu zero watermarking mixed architecture
CN107070638A (en) * 2017-04-20 2017-08-18 上海海洋大学 A kind of ocean remote sensing image privacy sharing method of dynamic weighting thresholding
CN107070638B (en) * 2017-04-20 2020-06-23 上海海洋大学 Ocean remote sensing image secret sharing method of dynamic weighting threshold
CN110278074A (en) * 2018-03-16 2019-09-24 临沂大学 A kind of visualization secret sharing scheme for Image Sharing encryption
CN110278074B (en) * 2018-03-16 2022-11-11 临沂大学 Visual secret sharing method for image encryption
CN110602349A (en) * 2019-08-27 2019-12-20 成都信息工程大学 Method for security protection of associated image content
CN110602349B (en) * 2019-08-27 2021-07-02 成都信息工程大学 Method for security protection of associated image content
CN113327105A (en) * 2021-08-03 2021-08-31 杭州志卓科技股份有限公司 B2B online payment transaction method based on digital image processing

Also Published As

Publication number Publication date
CN102142129B (en) 2012-07-04

Similar Documents

Publication Publication Date Title
Chang et al. A secure fragile watermarking scheme based on chaos-and-hamming code
Haghighi et al. TRLH: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique
Xuehua Digital watermarking and its application in image copyright protection
Lee et al. Dual watermark for image tamper detection and recovery
CN102142129B (en) Visual secret sharing-based image content tampering detection method
Azeroual et al. Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet
Hadmi et al. Perceptual image hashing
Hu et al. Dual-wrapped digital watermarking scheme for image copyright protection
CN102208097A (en) Network image copyright real-time distinguishing method
CN104063731A (en) Two-dimension code anti-counterfeiting printing and verification method adopting digital watermark technology
CN103700059B (en) The cloud storage view data property held method of proof based on multifunction digital watermark
Yuan et al. Gauss–Jordan elimination-based image tampering detection and self-recovery
CN102073978B (en) Method and system for identifying and recovering digital images by utilizing irregular region segmentation
Ni et al. Pinpoint authentication watermarking based on a chaotic system
Pan et al. A lossless watermarking scheme for halftone image authentication
Sethi et al. Video security against deepfakes and other forgeries
Kaur et al. XOR-EDGE based video steganography and testing against chi-square steganalysis
Riaz et al. Image authentication and restoration by multiple watermarking techniques with advance encryption standard in digital photography
Shukla Non-separable histogram based reversible data hiding approach using inverse S-order and skew tent map
CN103617589A (en) Information hiding method based on local histogram
Mathivadhani et al. Digital watermarking and information hiding using wavelets, SLSB and Visual cryptography method
Sumalatha et al. Local content based image authentication for tamper localization
Bhattacharyya et al. Watermarking Using Multiresolution Cosine Transformation: A Review
Latha et al. An efficient wavelet transform based steganography technique using chaotic map
Mehta et al. Biometric data security using joint encryption and watermarking

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120704

Termination date: 20150309

EXPY Termination of patent right or utility model