CN110276707B - Technical scheme for protecting and tamper detecting image data - Google Patents

Technical scheme for protecting and tamper detecting image data Download PDF

Info

Publication number
CN110276707B
CN110276707B CN201810216047.XA CN201810216047A CN110276707B CN 110276707 B CN110276707 B CN 110276707B CN 201810216047 A CN201810216047 A CN 201810216047A CN 110276707 B CN110276707 B CN 110276707B
Authority
CN
China
Prior art keywords
value
watermark
image data
image
detection method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810216047.XA
Other languages
Chinese (zh)
Other versions
CN110276707A (en
Inventor
张问银
张亚伟
赵伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Linyi University
Original Assignee
Linyi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Linyi University filed Critical Linyi University
Priority to CN201810216047.XA priority Critical patent/CN110276707B/en
Publication of CN110276707A publication Critical patent/CN110276707A/en
Application granted granted Critical
Publication of CN110276707B publication Critical patent/CN110276707B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0061Embedding of the watermark in each block of the image, e.g. segmented watermarking

Abstract

The invention relates to a technical scheme for protecting and tamper detecting image data, which is a novel technology capable of protecting copyright of digital products and maintaining data safety in an open network environment. The local contrast characteristic of LBP is fully utilized, and the Boolean function f is used

Description

Technical scheme for protecting and tamper detecting image data
Technical Field
The invention relates to hidden informatics, in particular to a space watermarking technology.
Background
The increasing popularity of the internet and the rapid growth of the information industry have profoundly changed our society and daily life, capturing, transmitting and storing digital data is very simple and convenient. However, this creates a big problem: how to protect such data and to prevent them from unauthorized modification. This problem also exists in other areas such as copyright protection, content authentication, information hiding, and communication coverage. Many researchers have developed various digital watermarking algorithms to solve this problem, and they have intended to embed some secret data (called watermark) content in the digital to mark or seal the digital data content. The principle of watermark embedding into a host image is: the distortion caused by embedding is too small to be noticeable. At the same time, the embedded watermark must be robust enough to resist common degradation or intentional attacks.
Disclosure of Invention
In view of this, the embodiment of the invention provides a technical scheme for protecting and tamper detecting image data. The scheme defines the Boolean function operation based on the LBP algorithm, adjusts one or more pixels in the neighborhood, enables the result of the function to be consistent with the w of the embedded watermark, and realizes that the watermark is embedded into the spatial domain so as to protect the host image from being tampered.
In order to achieve the above effects, the present invention proposes a technical solution for protecting and tamper detecting image data, including: single-stage watermarking scheme, double-layer watermarking scheme, and multi-layer watermarking scheme. The specific implementation process is as follows:
the single-layer watermarking technology scheme comprises the following steps:
watermark embedding algorithm:
step one: the original image is partitioned into (P, R) non-overlapping local area blocks. The LBP algorithm is used for calculation
Figure DEST_PATH_IMAGE002
And->
Figure DEST_PATH_IMAGE004
And->
Figure DEST_PATH_IMAGE006
. w represents one bit of the watermark, and beta is the strength factor of the watermark.
Step two: for each (P, R) local region, if
Figure 120220DEST_PATH_IMAGE006
And the value of (c) is equal to the value of w, we do nothing to do with the region pixels. Otherwise, for the sake of->
Figure 630836DEST_PATH_IMAGE006
The value of w is kept consistent with the value of w and the pixel value of the neighborhood needs to be modified.
Watermark extraction algorithm:
step one: judgment in watermark image
Figure 879415DEST_PATH_IMAGE006
Is a value of (2);
step two: extracting the watermark w. I.e. if
Figure 336941DEST_PATH_IMAGE006
And w is also 1 if the value of (2) is 1, otherwise 0.
In one embodiment of the present invention, the boolean function in the step one of the watermark embedding algorithm is:
Figure DEST_PATH_IMAGE008
Figure DEST_PATH_IMAGE010
where ∈is the exclusive or (XOR) operator,
Figure DEST_PATH_IMAGE012
。#1(/>
Figure DEST_PATH_IMAGE014
) Is indicated at->
Figure 338264DEST_PATH_IMAGE014
The median number of pixels of 1, #0 (+.>
Figure 762991DEST_PATH_IMAGE014
) Is indicated at->
Figure 498866DEST_PATH_IMAGE014
The median value is the number of pixels of 0, N is an integer, N +.>
Figure DEST_PATH_IMAGE016
. If->
Figure DEST_PATH_IMAGE018
Then
Figure DEST_PATH_IMAGE020
Return 1, otherwise it will return 0.
In one embodiment of the present invention, the watermark embedding algorithm is performed in the second step
Figure DEST_PATH_IMAGE022
The function value of (2) and w are identicalThe method comprises the following steps: let->
Figure DEST_PATH_IMAGE024
,/>
Figure DEST_PATH_IMAGE026
The method comprises the steps of carrying out a first treatment on the surface of the Or->
Figure DEST_PATH_IMAGE028
,/>
Figure DEST_PATH_IMAGE030
There is->
Figure DEST_PATH_IMAGE032
. Let->
Figure DEST_PATH_IMAGE034
There is->
Figure DEST_PATH_IMAGE036
Otherwise->
Figure DEST_PATH_IMAGE038
. If there are multiple minima, we choose any one of the minima to change the pixel value. If the pixels of a block are either 0 or 1, we will modify the center pixel according to the corresponding watermark bit and then embed it into the block.
The double-layer watermarking technical scheme comprises the following steps: areas to be treated
Figure 730389DEST_PATH_IMAGE014
Divided into two parts, even and odd neighborhoods, i.e. +.>
Figure DEST_PATH_IMAGE040
And->
Figure DEST_PATH_IMAGE042
. Execute +.>
Figure 523902DEST_PATH_IMAGE006
And implementing embedding two in a (P, R) neighborhoodBits. Thus, the capacity of the watermark is doubled.
The technical scheme of the multilayer watermarking is as follows: the 5×5 neighborhood is divided into 4 parts:
Figure DEST_PATH_IMAGE044
、/>
Figure DEST_PATH_IMAGE046
、/>
Figure DEST_PATH_IMAGE048
、/>
Figure DEST_PATH_IMAGE050
i=0-3, j=0-7 for
Figure 704216DEST_PATH_IMAGE044
And->
Figure 927387DEST_PATH_IMAGE046
Use +.>
Figure 257874DEST_PATH_IMAGE006
To embed the watermark; for->
Figure 250101DEST_PATH_IMAGE048
And->
Figure 801649DEST_PATH_IMAGE050
Use +.>
Figure 105592DEST_PATH_IMAGE020
Embedding a watermark in one of the areas and using +.>
Figure 974191DEST_PATH_IMAGE006
And embedding the watermark. Thus, four watermarks can be embedded individually without interfering with each other.
Compared with the existing digital watermarking algorithm, the scheme has the following advantages:
1. no requirement is made on the image format;
2. the expansion is easy;
3. the algorithm is simple and easy to realize;
4. the distortion caused by embedding is too small to be easily observed;
5. the embedded watermark is robust enough to resist common degradation and attacks.
Drawings
FIG. 1 is a diagram of a (P, R) local region definition according to an embodiment of the present invention;
FIG. 2 is a single layer watermark case in accordance with an embodiment of the present invention;
FIG. 3 is a two-layer watermarking scheme according to an embodiment of the present invention;
FIG. 4 is a double-layer watermark case according to an embodiment of the present invention;
FIG. 5 is a multi-layer watermarking scheme according to an embodiment of the present invention;
fig. 6 is a multi-layer watermark case according to an embodiment of the invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, the (P, R) local area definition of the embodiment of the present invention includes:
S1、
Figure DEST_PATH_IMAGE052
representing the gray level of the center pixel c;
S2、
Figure DEST_PATH_IMAGE054
gray value representing adjacent pixel p +.>
Figure 211137DEST_PATH_IMAGE002
Is composed of adjacent pixel p and central pixel +.>
Figure 139779DEST_PATH_IMAGE052
Vector generated by difference value between them, and +.>
Figure 931017DEST_PATH_IMAGE014
Is the symbol vector from this difference.
As shown in fig. 2, the single-layer watermark case of the embodiment of the present invention includes:
watermark embedding algorithm:
s1, dividing an original image into local area blocks which are not overlapped. The LBP algorithm is used for calculation
Figure 478673DEST_PATH_IMAGE002
And->
Figure 38968DEST_PATH_IMAGE004
And->
Figure 407019DEST_PATH_IMAGE006
. Let w represent one bit of the watermark and beta be the intensity factor of the watermark;
s2, for each (P, R) local region, if
Figure 419975DEST_PATH_IMAGE006
And the value of (c) is equal to the value of w, we do nothing to do with the region pixels. Otherwise, for the sake of->
Figure 771322DEST_PATH_IMAGE006
Keeping the values of w consistent with the corresponding w, we modify the neighborhood pixels.
Watermark extraction algorithm: in watermark images we judge
Figure 186123DEST_PATH_IMAGE006
To extract the watermark w.
As shown in fig. 3, the dual-layer watermarking scheme according to the embodiment of the present invention includes:
s1, neighborhood is processed
Figure 190988DEST_PATH_IMAGE014
Divided into two parts, even and odd neighborhoods, i.e. +.>
Figure 691239DEST_PATH_IMAGE040
And->
Figure 705332DEST_PATH_IMAGE042
S2, executing them
Figure 240218DEST_PATH_IMAGE006
And embedding two bits in the (P, R) neighborhood is achieved. In this way the capacity of the watermark is doubled, which in practice amounts to two (4, 1) neighborhoods.
As shown in fig. 4, the dual-layer watermark case of the embodiment of the present invention includes:
s1, embedding watermarks W1 and W2 into an original image Lena, and extracting;
s2, verifying the performance of the spatial watermarking algorithm.
As shown in fig. 5, the multi-layer watermarking scheme according to the embodiment of the present invention includes:
s1, dividing a 5×5 neighborhood into 4 parts:
Figure 415985DEST_PATH_IMAGE044
、/>
Figure 810057DEST_PATH_IMAGE046
、/>
Figure 105471DEST_PATH_IMAGE048
、/>
Figure 229284DEST_PATH_IMAGE050
i=0-3, j=0-7 for +.>
Figure 107111DEST_PATH_IMAGE044
And->
Figure 988479DEST_PATH_IMAGE046
Using
Figure 609953DEST_PATH_IMAGE006
To embed the watermark; for->
Figure 853853DEST_PATH_IMAGE048
And->
Figure 512367DEST_PATH_IMAGE050
Use +.>
Figure 474507DEST_PATH_IMAGE020
Embedding a watermark in one of the areas and using +.>
Figure 102934DEST_PATH_IMAGE006
And embedding the watermark. Thus, four watermarks can be embedded individually without interfering with each other.
S2、
Figure DEST_PATH_IMAGE056
I=0-3 is 4 watermarks. First of all embed +.>
Figure DEST_PATH_IMAGE058
And->
Figure DEST_PATH_IMAGE060
One of which is embedded by modifying the value of the center pixel (watermark coefficient=0.02) and the other by changing one of the non-center pixels (watermark coefficient=0.08). Then, the +/is embedded again according to the scheme depicted in FIG. 3>
Figure DEST_PATH_IMAGE062
And->
Figure DEST_PATH_IMAGE064
As shown in fig. 6, the multi-layer watermark case of the embodiment of the present invention includes:
s1, embedding a watermark e, f, g, h into an original image a, b, c, d;
s2, accurately extracting the watermarks, wherein the embedding processes of the four watermarks cannot affect each other.
Although embodiments of the present invention have been described in connection with the accompanying drawings, various modifications and variations may be made by those skilled in the art without departing from the spirit and scope of the invention, and such modifications and variations fall within the scope of the invention as defined by the appended claims.

Claims (6)

1. An image data protection and tamper detection method, characterized in that:
the watermark embedding algorithm comprises:
step one: the original image is divided into (P, R) non-overlapping local area blocks;
LBP pattern for calculating m p Sum s p And (b)
Figure FDA0004044696340000011
m p Representing a vector generated by a difference value between an adjacent pixel and a center pixel, s p A symbol vector representing the difference from the first set of symbols;
step two: for each (P, R) local neighborhood, if
Figure FDA0004044696340000012
The value of (2) is equal to the value of w, and no processing is performed on the neighborhood pixels; otherwise, for the sake of->
Figure FDA0004044696340000013
The value of w is consistent with the value of w, the pixel value of the neighborhood needs to be modified, and w represents one bit of the watermark;
the watermark extraction algorithm comprises:
step one: judgment in watermark image
Figure FDA0004044696340000014
Is a value of (2);
step two: extracting watermark w, i.e. if
Figure FDA0004044696340000015
And w is also 1 if the value of (2) is 1, otherwise 0.
2. The image data protection and tamper detection method according to claim 1, wherein: by varying f(s) p ) Is embedded with the watermark by changing the value of s () p Which reflect changes in pixels in a local region of space, different boolean functions corresponding to different algorithms.
3. The image data protection and tamper detection method according to claim 1, wherein: the watermark extraction process is direct and only requires a judgment function
Figure FDA0004044696340000016
The watermark can be extracted from the value of (a).
4. The image data protection and tamper detection method according to claim 1, wherein: when the function value is different from one of the watermark bits, the watermark is obtained by the intensity factor beta and the minimum value m i To change the pixel values of the neighborhood.
5. The image data protection and tamper detection method according to claim 1, wherein: any at s p The looping bit rotated clockwise or counterclockwise above will not change the function value, but any change in bit from 0 to 1 or 1 to 0 will reverse the function value.
6. The image data protection and tamper detection method according to claim 1, wherein: the value of N is determined according to the image quality if s p The difference between the number of pixels with a median value of 1 and the number of pixels with a value of 0 is greater than N, N being an integerAnd N is less than or equal to P-1, then the function f # (s p ) Taking 1, otherwise, function f # (s p ) Taking 0, f # (s p ) Is not affected by displacement and rotation.
CN201810216047.XA 2018-03-16 2018-03-16 Technical scheme for protecting and tamper detecting image data Active CN110276707B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810216047.XA CN110276707B (en) 2018-03-16 2018-03-16 Technical scheme for protecting and tamper detecting image data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810216047.XA CN110276707B (en) 2018-03-16 2018-03-16 Technical scheme for protecting and tamper detecting image data

Publications (2)

Publication Number Publication Date
CN110276707A CN110276707A (en) 2019-09-24
CN110276707B true CN110276707B (en) 2023-06-23

Family

ID=67958851

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810216047.XA Active CN110276707B (en) 2018-03-16 2018-03-16 Technical scheme for protecting and tamper detecting image data

Country Status (1)

Country Link
CN (1) CN110276707B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111882525A (en) * 2020-07-01 2020-11-03 上海品览数据科技有限公司 Image reproduction detection method based on LBP watermark characteristics and fine-grained identification
CN113191953B (en) * 2021-06-04 2022-02-18 山东财经大学 Transformer-based face image super-resolution method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6205249B1 (en) * 1998-04-02 2001-03-20 Scott A. Moskowitz Multiple transform utilization and applications for secure digital watermarking
JP2002354219A (en) * 2001-05-23 2002-12-06 Sony Corp Method and device for embedding electronic watermark and program
JP2007189676A (en) * 2005-12-14 2007-07-26 Toyohashi Univ Of Technology Information embedding method to texture image and information reading method, and information embedding instrument to texture image and information reading instrument
CN102306305A (en) * 2011-07-06 2012-01-04 北京航空航天大学 Method for authenticating safety identity based on organic characteristic watermark
CN105447492A (en) * 2015-11-13 2016-03-30 重庆邮电大学 Image description method based on 2D local binary pattern
CN105844643A (en) * 2016-03-30 2016-08-10 北京信息科技大学 Image tamper detection method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002232685A (en) * 2001-01-31 2002-08-16 Canon Inc Digital watermark processing device, information processor, digital contents delivery system, digital watermark insertion method, and storage medium
US10354355B2 (en) * 2014-07-29 2019-07-16 Tata Consultancy Services Limited Digital watermarking
US9639912B2 (en) * 2014-12-30 2017-05-02 University Of Macau Method for reversible image data hiding
US10223788B2 (en) * 2016-08-31 2019-03-05 International Business Machines Corporation Skin lesion segmentation using deep convolution networks guided by local unsupervised learning

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6205249B1 (en) * 1998-04-02 2001-03-20 Scott A. Moskowitz Multiple transform utilization and applications for secure digital watermarking
JP2002354219A (en) * 2001-05-23 2002-12-06 Sony Corp Method and device for embedding electronic watermark and program
JP2007189676A (en) * 2005-12-14 2007-07-26 Toyohashi Univ Of Technology Information embedding method to texture image and information reading method, and information embedding instrument to texture image and information reading instrument
CN102306305A (en) * 2011-07-06 2012-01-04 北京航空航天大学 Method for authenticating safety identity based on organic characteristic watermark
CN105447492A (en) * 2015-11-13 2016-03-30 重庆邮电大学 Image description method based on 2D local binary pattern
CN105844643A (en) * 2016-03-30 2016-08-10 北京信息科技大学 Image tamper detection method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Semi-fragile spatial watermarking based on local binary pattern operators;Zhang Wenyin等;《OPTICS COMMUNICATIONS》;20110801;第284卷(第16-17期);第3904-3912页 *
一种不可见性和鲁棒性均衡的数字图像水印技术;曹海;《微电子学与计算机》;20151105(第11期);第162-165页 *

Also Published As

Publication number Publication date
CN110276707A (en) 2019-09-24

Similar Documents

Publication Publication Date Title
Maniriho et al. Information hiding scheme for digital images using difference expansion and modulus function
Alahmadi et al. Splicing image forgery detection based on DCT and Local Binary Pattern
Keshavarzian et al. ROI based robust and secure image watermarking using DWT and Arnold map
Rajput et al. Image tamper detection and self-recovery using multiple median watermarking
Aminuddin et al. AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation
CN110276707B (en) Technical scheme for protecting and tamper detecting image data
Zeki et al. An intermediate significant bit (ISB) watermarking technique using neural networks
CN110503592B (en) Two-dimensional code anti-counterfeiting method and system based on digital watermark
Kapse et al. Digital image security using digital watermarking
Calagna et al. A robust watermarking system based on SVD compression
Ho et al. A semi-fragile pinned sine transform watermarking system for content authentication of satellite images
Saryazdi et al. A blind digital watermark in Hadamard domain
Chhajed et al. Data hiding in binary images for secret and secure communication using decision tree
Jambhale et al. A deep learning approach to invisible watermarking for copyright protection
Surekha et al. A watermarking technique based on visual cryptography
Xiao et al. A semi-fragile watermarking tolerant of Laplacian sharpening
Makhrib et al. Improved fragile watermarking technique using modified LBP operator
Punitha et al. Notice of Violation of IEEE Publication Principles: Binary watermarking technique based on Visual Cryptography
Moon et al. Hardware-based application of data security system using general modified secured diamond encoding embedding approach for enhancing imperceptibility and authentication
Ahmad et al. Data Embedding in Color Images: A Secure Data Communication Framework Based on Modular Arithmetic
Lin et al. Hierarchical fragile watermarking scheme for image authentication
Chotikakamthorn et al. Digital watermarking technique for image authentication by neighbouring block similarity measure
Singh et al. False-Positive-Free and Geometric Robust Digital Image Watermarking Method Based on IWT-DCT-SVD
Sun et al. FRRW: A feature extraction-based robust and reversible watermarking scheme utilizing zernike moments and histogram shifting
Chhajed et al. Secure Data Hiding in Binary Images Using Run-Length Pairs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant