CN110276707B - Technical scheme for protecting and tamper detecting image data - Google Patents
Technical scheme for protecting and tamper detecting image data Download PDFInfo
- Publication number
- CN110276707B CN110276707B CN201810216047.XA CN201810216047A CN110276707B CN 110276707 B CN110276707 B CN 110276707B CN 201810216047 A CN201810216047 A CN 201810216047A CN 110276707 B CN110276707 B CN 110276707B
- Authority
- CN
- China
- Prior art keywords
- value
- watermark
- image data
- image
- detection method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
Abstract
The invention relates to a technical scheme for protecting and tamper detecting image data, which is a novel technology capable of protecting copyright of digital products and maintaining data safety in an open network environment. The local contrast characteristic of LBP is fully utilized, and the Boolean function f is used
Description
Technical Field
The invention relates to hidden informatics, in particular to a space watermarking technology.
Background
The increasing popularity of the internet and the rapid growth of the information industry have profoundly changed our society and daily life, capturing, transmitting and storing digital data is very simple and convenient. However, this creates a big problem: how to protect such data and to prevent them from unauthorized modification. This problem also exists in other areas such as copyright protection, content authentication, information hiding, and communication coverage. Many researchers have developed various digital watermarking algorithms to solve this problem, and they have intended to embed some secret data (called watermark) content in the digital to mark or seal the digital data content. The principle of watermark embedding into a host image is: the distortion caused by embedding is too small to be noticeable. At the same time, the embedded watermark must be robust enough to resist common degradation or intentional attacks.
Disclosure of Invention
In view of this, the embodiment of the invention provides a technical scheme for protecting and tamper detecting image data. The scheme defines the Boolean function operation based on the LBP algorithm, adjusts one or more pixels in the neighborhood, enables the result of the function to be consistent with the w of the embedded watermark, and realizes that the watermark is embedded into the spatial domain so as to protect the host image from being tampered.
In order to achieve the above effects, the present invention proposes a technical solution for protecting and tamper detecting image data, including: single-stage watermarking scheme, double-layer watermarking scheme, and multi-layer watermarking scheme. The specific implementation process is as follows:
the single-layer watermarking technology scheme comprises the following steps:
watermark embedding algorithm:
step one: the original image is partitioned into (P, R) non-overlapping local area blocks. The LBP algorithm is used for calculationAnd->And->. w represents one bit of the watermark, and beta is the strength factor of the watermark.
Step two: for each (P, R) local region, ifAnd the value of (c) is equal to the value of w, we do nothing to do with the region pixels. Otherwise, for the sake of->The value of w is kept consistent with the value of w and the pixel value of the neighborhood needs to be modified.
Watermark extraction algorithm:
In one embodiment of the present invention, the boolean function in the step one of the watermark embedding algorithm is:
where ∈is the exclusive or (XOR) operator,。#1(/>) Is indicated at->The median number of pixels of 1, #0 (+.>) Is indicated at->The median value is the number of pixels of 0, N is an integer, N +.>. If->ThenReturn 1, otherwise it will return 0.
In one embodiment of the present invention, the watermark embedding algorithm is performed in the second stepThe function value of (2) and w are identicalThe method comprises the following steps: let->,/>The method comprises the steps of carrying out a first treatment on the surface of the Or->,/>There is->. Let->There is->Otherwise->. If there are multiple minima, we choose any one of the minima to change the pixel value. If the pixels of a block are either 0 or 1, we will modify the center pixel according to the corresponding watermark bit and then embed it into the block.
The double-layer watermarking technical scheme comprises the following steps: areas to be treatedDivided into two parts, even and odd neighborhoods, i.e. +.>And->. Execute +.>And implementing embedding two in a (P, R) neighborhoodBits. Thus, the capacity of the watermark is doubled.
The technical scheme of the multilayer watermarking is as follows: the 5×5 neighborhood is divided into 4 parts:、/>、/>、/>i=0-3, j=0-7 forAnd->Use +.>To embed the watermark; for->And->Use +.>Embedding a watermark in one of the areas and using +.>And embedding the watermark. Thus, four watermarks can be embedded individually without interfering with each other.
Compared with the existing digital watermarking algorithm, the scheme has the following advantages:
1. no requirement is made on the image format;
2. the expansion is easy;
3. the algorithm is simple and easy to realize;
4. the distortion caused by embedding is too small to be easily observed;
5. the embedded watermark is robust enough to resist common degradation and attacks.
Drawings
FIG. 1 is a diagram of a (P, R) local region definition according to an embodiment of the present invention;
FIG. 2 is a single layer watermark case in accordance with an embodiment of the present invention;
FIG. 3 is a two-layer watermarking scheme according to an embodiment of the present invention;
FIG. 4 is a double-layer watermark case according to an embodiment of the present invention;
FIG. 5 is a multi-layer watermarking scheme according to an embodiment of the present invention;
fig. 6 is a multi-layer watermark case according to an embodiment of the invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, the (P, R) local area definition of the embodiment of the present invention includes:
S2、gray value representing adjacent pixel p +.>Is composed of adjacent pixel p and central pixel +.>Vector generated by difference value between them, and +.>Is the symbol vector from this difference.
As shown in fig. 2, the single-layer watermark case of the embodiment of the present invention includes:
watermark embedding algorithm:
s1, dividing an original image into local area blocks which are not overlapped. The LBP algorithm is used for calculationAnd->And->. Let w represent one bit of the watermark and beta be the intensity factor of the watermark;
s2, for each (P, R) local region, ifAnd the value of (c) is equal to the value of w, we do nothing to do with the region pixels. Otherwise, for the sake of->Keeping the values of w consistent with the corresponding w, we modify the neighborhood pixels.
As shown in fig. 3, the dual-layer watermarking scheme according to the embodiment of the present invention includes:
S2, executing themAnd embedding two bits in the (P, R) neighborhood is achieved. In this way the capacity of the watermark is doubled, which in practice amounts to two (4, 1) neighborhoods.
As shown in fig. 4, the dual-layer watermark case of the embodiment of the present invention includes:
s1, embedding watermarks W1 and W2 into an original image Lena, and extracting;
s2, verifying the performance of the spatial watermarking algorithm.
As shown in fig. 5, the multi-layer watermarking scheme according to the embodiment of the present invention includes:
s1, dividing a 5×5 neighborhood into 4 parts:、/>、/>、/>i=0-3, j=0-7 for +.>And->UsingTo embed the watermark; for->And->Use +.>Embedding a watermark in one of the areas and using +.>And embedding the watermark. Thus, four watermarks can be embedded individually without interfering with each other.
S2、I=0-3 is 4 watermarks. First of all embed +.>And->One of which is embedded by modifying the value of the center pixel (watermark coefficient=0.02) and the other by changing one of the non-center pixels (watermark coefficient=0.08). Then, the +/is embedded again according to the scheme depicted in FIG. 3>And->。
As shown in fig. 6, the multi-layer watermark case of the embodiment of the present invention includes:
s1, embedding a watermark e, f, g, h into an original image a, b, c, d;
s2, accurately extracting the watermarks, wherein the embedding processes of the four watermarks cannot affect each other.
Although embodiments of the present invention have been described in connection with the accompanying drawings, various modifications and variations may be made by those skilled in the art without departing from the spirit and scope of the invention, and such modifications and variations fall within the scope of the invention as defined by the appended claims.
Claims (6)
1. An image data protection and tamper detection method, characterized in that:
the watermark embedding algorithm comprises:
step one: the original image is divided into (P, R) non-overlapping local area blocks;
LBP pattern for calculating m p Sum s p And (b)m p Representing a vector generated by a difference value between an adjacent pixel and a center pixel, s p A symbol vector representing the difference from the first set of symbols;
step two: for each (P, R) local neighborhood, ifThe value of (2) is equal to the value of w, and no processing is performed on the neighborhood pixels; otherwise, for the sake of->The value of w is consistent with the value of w, the pixel value of the neighborhood needs to be modified, and w represents one bit of the watermark;
the watermark extraction algorithm comprises:
2. The image data protection and tamper detection method according to claim 1, wherein: by varying f(s) p ) Is embedded with the watermark by changing the value of s () p Which reflect changes in pixels in a local region of space, different boolean functions corresponding to different algorithms.
4. The image data protection and tamper detection method according to claim 1, wherein: when the function value is different from one of the watermark bits, the watermark is obtained by the intensity factor beta and the minimum value m i To change the pixel values of the neighborhood.
5. The image data protection and tamper detection method according to claim 1, wherein: any at s p The looping bit rotated clockwise or counterclockwise above will not change the function value, but any change in bit from 0 to 1 or 1 to 0 will reverse the function value.
6. The image data protection and tamper detection method according to claim 1, wherein: the value of N is determined according to the image quality if s p The difference between the number of pixels with a median value of 1 and the number of pixels with a value of 0 is greater than N, N being an integerAnd N is less than or equal to P-1, then the function f # (s p ) Taking 1, otherwise, function f # (s p ) Taking 0, f # (s p ) Is not affected by displacement and rotation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810216047.XA CN110276707B (en) | 2018-03-16 | 2018-03-16 | Technical scheme for protecting and tamper detecting image data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810216047.XA CN110276707B (en) | 2018-03-16 | 2018-03-16 | Technical scheme for protecting and tamper detecting image data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110276707A CN110276707A (en) | 2019-09-24 |
CN110276707B true CN110276707B (en) | 2023-06-23 |
Family
ID=67958851
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810216047.XA Active CN110276707B (en) | 2018-03-16 | 2018-03-16 | Technical scheme for protecting and tamper detecting image data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110276707B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111882525A (en) * | 2020-07-01 | 2020-11-03 | 上海品览数据科技有限公司 | Image reproduction detection method based on LBP watermark characteristics and fine-grained identification |
CN113191953B (en) * | 2021-06-04 | 2022-02-18 | 山东财经大学 | Transformer-based face image super-resolution method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6205249B1 (en) * | 1998-04-02 | 2001-03-20 | Scott A. Moskowitz | Multiple transform utilization and applications for secure digital watermarking |
JP2002354219A (en) * | 2001-05-23 | 2002-12-06 | Sony Corp | Method and device for embedding electronic watermark and program |
JP2007189676A (en) * | 2005-12-14 | 2007-07-26 | Toyohashi Univ Of Technology | Information embedding method to texture image and information reading method, and information embedding instrument to texture image and information reading instrument |
CN102306305A (en) * | 2011-07-06 | 2012-01-04 | 北京航空航天大学 | Method for authenticating safety identity based on organic characteristic watermark |
CN105447492A (en) * | 2015-11-13 | 2016-03-30 | 重庆邮电大学 | Image description method based on 2D local binary pattern |
CN105844643A (en) * | 2016-03-30 | 2016-08-10 | 北京信息科技大学 | Image tamper detection method |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002232685A (en) * | 2001-01-31 | 2002-08-16 | Canon Inc | Digital watermark processing device, information processor, digital contents delivery system, digital watermark insertion method, and storage medium |
US10354355B2 (en) * | 2014-07-29 | 2019-07-16 | Tata Consultancy Services Limited | Digital watermarking |
US9639912B2 (en) * | 2014-12-30 | 2017-05-02 | University Of Macau | Method for reversible image data hiding |
US10223788B2 (en) * | 2016-08-31 | 2019-03-05 | International Business Machines Corporation | Skin lesion segmentation using deep convolution networks guided by local unsupervised learning |
-
2018
- 2018-03-16 CN CN201810216047.XA patent/CN110276707B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6205249B1 (en) * | 1998-04-02 | 2001-03-20 | Scott A. Moskowitz | Multiple transform utilization and applications for secure digital watermarking |
JP2002354219A (en) * | 2001-05-23 | 2002-12-06 | Sony Corp | Method and device for embedding electronic watermark and program |
JP2007189676A (en) * | 2005-12-14 | 2007-07-26 | Toyohashi Univ Of Technology | Information embedding method to texture image and information reading method, and information embedding instrument to texture image and information reading instrument |
CN102306305A (en) * | 2011-07-06 | 2012-01-04 | 北京航空航天大学 | Method for authenticating safety identity based on organic characteristic watermark |
CN105447492A (en) * | 2015-11-13 | 2016-03-30 | 重庆邮电大学 | Image description method based on 2D local binary pattern |
CN105844643A (en) * | 2016-03-30 | 2016-08-10 | 北京信息科技大学 | Image tamper detection method |
Non-Patent Citations (2)
Title |
---|
Semi-fragile spatial watermarking based on local binary pattern operators;Zhang Wenyin等;《OPTICS COMMUNICATIONS》;20110801;第284卷(第16-17期);第3904-3912页 * |
一种不可见性和鲁棒性均衡的数字图像水印技术;曹海;《微电子学与计算机》;20151105(第11期);第162-165页 * |
Also Published As
Publication number | Publication date |
---|---|
CN110276707A (en) | 2019-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Maniriho et al. | Information hiding scheme for digital images using difference expansion and modulus function | |
Alahmadi et al. | Splicing image forgery detection based on DCT and Local Binary Pattern | |
Keshavarzian et al. | ROI based robust and secure image watermarking using DWT and Arnold map | |
Rajput et al. | Image tamper detection and self-recovery using multiple median watermarking | |
Aminuddin et al. | AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation | |
CN110276707B (en) | Technical scheme for protecting and tamper detecting image data | |
Zeki et al. | An intermediate significant bit (ISB) watermarking technique using neural networks | |
CN110503592B (en) | Two-dimensional code anti-counterfeiting method and system based on digital watermark | |
Kapse et al. | Digital image security using digital watermarking | |
Calagna et al. | A robust watermarking system based on SVD compression | |
Ho et al. | A semi-fragile pinned sine transform watermarking system for content authentication of satellite images | |
Saryazdi et al. | A blind digital watermark in Hadamard domain | |
Chhajed et al. | Data hiding in binary images for secret and secure communication using decision tree | |
Jambhale et al. | A deep learning approach to invisible watermarking for copyright protection | |
Surekha et al. | A watermarking technique based on visual cryptography | |
Xiao et al. | A semi-fragile watermarking tolerant of Laplacian sharpening | |
Makhrib et al. | Improved fragile watermarking technique using modified LBP operator | |
Punitha et al. | Notice of Violation of IEEE Publication Principles: Binary watermarking technique based on Visual Cryptography | |
Moon et al. | Hardware-based application of data security system using general modified secured diamond encoding embedding approach for enhancing imperceptibility and authentication | |
Ahmad et al. | Data Embedding in Color Images: A Secure Data Communication Framework Based on Modular Arithmetic | |
Lin et al. | Hierarchical fragile watermarking scheme for image authentication | |
Chotikakamthorn et al. | Digital watermarking technique for image authentication by neighbouring block similarity measure | |
Singh et al. | False-Positive-Free and Geometric Robust Digital Image Watermarking Method Based on IWT-DCT-SVD | |
Sun et al. | FRRW: A feature extraction-based robust and reversible watermarking scheme utilizing zernike moments and histogram shifting | |
Chhajed et al. | Secure Data Hiding in Binary Images Using Run-Length Pairs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |