CN101562681A - Method for generating digital photo containing watermark based on state parameter - Google Patents

Method for generating digital photo containing watermark based on state parameter Download PDF

Info

Publication number
CN101562681A
CN101562681A CNA2009100594210A CN200910059421A CN101562681A CN 101562681 A CN101562681 A CN 101562681A CN A2009100594210 A CNA2009100594210 A CN A2009100594210A CN 200910059421 A CN200910059421 A CN 200910059421A CN 101562681 A CN101562681 A CN 101562681A
Authority
CN
China
Prior art keywords
key
camera
digital
photo
state parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2009100594210A
Other languages
Chinese (zh)
Other versions
CN101562681B (en
Inventor
和红杰
陈帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southwest Jiaotong University
Original Assignee
Southwest Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southwest Jiaotong University filed Critical Southwest Jiaotong University
Priority to CN2009100594210A priority Critical patent/CN101562681B/en
Publication of CN101562681A publication Critical patent/CN101562681A/en
Application granted granted Critical
Publication of CN101562681B publication Critical patent/CN101562681B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Studio Devices (AREA)
  • Image Processing (AREA)

Abstract

The invention provides a method for generating a digital photo containing a watermark based on a state parameter. The method comprises that: when a digital camera takes a photo, an image signal is processed through a central processor to obtain digital image data; the central processor reads the focal length, aperture, exposure time, shooting time and photosensibility when taking the photo as state parameters; a camera key is generated by a camera identification number and a key set function; the state parameters and the camera key are used as a plaintext, and an authentication key of the digital photo is generated by hash function; the authentication key is used to generate watermark-containing digital image data of the image data; and the watermark-containing digital image data is synthesized with a header file EXIF of the photo into a photo output file to be stored in an external memory of the camera. The authentication key of the digital photo containing watermark generated by the method has good privacy, not only can effectively prevent 'collage attack', but also can effectively resist 'copying attack'. Meanwhile, participation of the digital camera or key transfer is not required in authentication, so that disclosure and high efficiency of the digital photo authentication are realized.

Description

Generation method based on the moisture printing word photo of state parameter
Affiliated technical field
The present invention relates to a kind of generation method of moisture printing word photo, be used for conveniently, in time and publicly detecting and verifying authenticity, integrality and the primitiveness of digital photos.
Background technology
In computer technology, the network communications technology and digital image-forming technology growing today, digital camera is come into huge numbers of families, and the digital photos that digital camera is taken has become us and obtained and the main source of exchange message and the important carrier that information is propagated.Simultaneously, the appearance of the digitlization of image storage and various image processing softwares makes editor, the modification of digital photos and synthesizes and becomes very simple.Digital image processing techniques can improve the display quality of image on the one hand, enrich our life, make things convenient for our work.On the other hand, distort and forge digital photograph and the field such as send out, can bring serious negative effect the sincerity of society, the public credibility of government and the authenticity of science etc. as being used to news media, court evidence and science.Forge the existence of digital photos, the threat that digital photos is faced lose confidence.As " square dove " and the incidents such as " Tibetan antelopes " of recent people's extensive concern, the photo supplier utilizes the image processing instrument that several digital photos are distorted, pieced together, synthesize generation " pseudo-photo " and become prize-winning news photograph.Through collecting evidence in many ways and identifying, the photo supplier of these incidents has admitted that there is the composition of revising in its prize-winning news photograph publicly.Although the awards of these works are retracted, a lot of resources (financial resources, material resources, time etc.) have been spent to identify their authenticity and integrity.This makes that people can throw doubt upon to the authenticity of news digital photos unavoidably, also has the pseudo-photo of what " hiding " not to be found in the news picture, makes the credible problem of digital photos develop into serious social honesty issue day by day.Therefore, just drawn the authentication question of authenticity, integrality and the primitiveness of digital photos.One of effective ways that address this problem are to realize by digital camera built-in watermark merge module and corresponding Verification System.
The nearest background technology relevant with digital camera and authenticating water-mark can be consulted following several pieces of documents:
[1].P.Blythe,J.Fridrich.Secure?Digital?Camera,Digital?Forensic?Research?Workshop,Baltimore,August?11-13,2004
[2]. the field is new, Liu Man, a kind of digital camera that watermark embeds function, application number 2005100034309.X, open day 2007.7 of having of Yang Xiang brightness
[3].Yu?Miao,He?Hongjie,Zhang?Jiashu,A?digital?authentication?watermarking?scheme?forJPEG?images?with?superior?localization?and?security,Sci?China?Ser?F-Info?Sci,2007.50(3):491-509.
[4].X.Zhang,and?S.Wang.Statistical?fragile?watermarking?capable?of?locating?individualtampered?pixels.IEEE?Signal?processing?Letter,October?2007,14(10):727-731
[5].Hongjie?He,Jiashu?Zhang,Fan?Chen.Adjacent-block?Based?Statistical?Detection?Methodfor?Self-Embedding?Watermarking?Techniques,Signal?processing,doi:10.1016/j.sigpro.2009.02.009
Above document has disclosed when digital photograph is taken in [1], provide can be in digital photograph the digital camera of embed watermark information function, should " watermark information " be used for detecting authenticity, integrality and the primitiveness of taking the digital photograph content, can be used for also differentiating that digital photograph taken pictures by a certain digital camera and someone.For avoiding utilizing computer to forge moisture printing word photo, the authenticate key of digital photos must be maintained secrecy.This is because if there is the people to obtain the authenticate key of moisture printing word photo, watermarked again when juggling the figures photo on computers also can be by authentication [2].For this reason, people such as the Tian Xin of Huaqi IDTC [2] propose to adopt " encapsulation " technology that camera key is built in the digital camera, to improve the confidentiality of moisture printing word photo authenticate key.Simultaneously, An Quan authenticating water-mark algorithm research is one of key technology that addresses this problem all the time.Recent study person from fail safe [3], positioning accuracy [4], distort restorability aspects such as [5] digital picture authenticating water-mark algorithm carried out deep research and analysis.
Yet still there is following problem in prior art: the digital camera of (1) shooting digital photos must participate in the verification process of digital photos, and this is infeasible in some practical application.For example, the news report that the correspondent beams back will just be delivered after the digital camera of taking pictures returns to participate in anti-fake certificate by issuing after the authentication, and news has also become " old lore ".(2) utilize same digital camera, can obtain numerous moisture printing word photos, their authenticate key all is identical, this has not only increased the risk that camera key is leaked, and for implementing people (J.Fridrich such as Fridrich, M.Goljan and N.Memon.Cryptanalysis of the Yeung-Mintzer Fragile Watermarking Technique Electronic Imaging, April2002,11 (4): 262-274) " the piecing attack together " of Ti Chuing provides condition.Many digital photos that also are about to same digital camera shooting are pieced together, synthetic " the pseudo-photo " that obtains might will prevent that this attack from then can improve the difficulty and the complexity of authenticating water-mark algorithm design by authentication.(3) the most important thing is, the camera owner utilizes secondary or several digital photos, after image processing software editor, modification, processing such as synthetic, print synthetic photo, again the photo of printing is carried out reproduction, " the pseudo-photo " that obtains thus still can be by the authentication (this attack abbreviates " reproduction attack " as) of authenticating water-mark.Simultaneously, the assailant is by distorting the digital photos header file EXIF of state parameters such as comprising focal length, aperture, time for exposure, shooting time, photosensitivity, can destroy the basic general knowledge of utilizing optical imagery and judge the clear evidence of " reproduction photo ", thereby make the authenticating water-mark algorithm can not provide strong evidence and prove that according to this " reproduction photo " forge, promptly existing authenticating water-mark algorithm is difficult to effectively opposing " reproduction attack ".
Summary of the invention
The purpose of this invention is to provide a kind of moisture printing word photograph generation method based on state parameter, this method generates the good confidentiality of the authenticate key of moisture printing word photo, has both stoped " piecing attack together " effectively, is highly resistant to " reproduction attack " again.Simultaneously, neither need the participation of digital camera during authentication, also do not need the key transmission, realized the open and efficient of digital photos authentication.
The present invention solves its technical problem, and the technical scheme that is adopted is: the generation method based on the moisture printing word photo of state parameter comprises the steps:
When (1) digital camera is taken pictures, the signal that camera lens obtains is handled through central processing unit and is obtained DID D, and the focal length when central processing unit reads digital camera and takes this photo simultaneously, aperture, time for exposure, shooting time, photosensitivity are as state parameter S;
(2), according to " the camera ID C " that preserve in the digital camera read-only memory, utilize key that function F (k) is set and generate camera key K L, wherein k is a key;
(3), with the state parameter S of step (1) and the camera key K of step (2) LAs expressly, utilize hash function H () to generate the authenticate key K=H (K of this digital photos L, S);
(4), with authenticate key K as the watermark embedded key, utilize authenticating water-mark to embed among the view data D of algorithm in step (1) and embed authenticating water-mark, generate moisture printing digital image data X;
(5) moisture printing digital image data X being synthesized the photo output file with the photo header file EXIF that comprises state parameter S and camera ID C is kept in the external memory of digital camera.
Compared with prior art, the invention has the beneficial effects as follows:
1, the present invention utilizes hash function, and the focal length of digital camera, aperture, time for exposure, shooting time, these state parameters of photosensitivity generated " authenticate key " of this digital photos when digital photos was taken as a hash function part expressly.Because the identical possibility of state parameter of different digital photo is very little, according to the character of hash function as can be known, even the digital photos that same digital camera is taken, the possibility that its authenticate key is identical exists hardly, thereby has eliminated the condition that enforcement " is pieced attack together ".Therefore the watermarking algorithm that uses among the present invention need not the to possess opposing ability of " piecing attack together ", thus requirement reduced to the authenticating water-mark algorithm design, and the complexity of watermarking algorithm is low.
2, to the reproduction photo, if the parameter in the digital photos in the header file is modified, inconsistent when state parameter that Verification System is read and generation authenticate key as the state parameter of expressly input, thereby the authenticate key that the authenticate key that causes generating adopted when embedding with watermark is different, and the reproduction digital photos can't be by authentication; On the other hand, state parameter if the assailant does not juggle the figures in the photo header file, in conjunction with optics, the photography general knowledge (focal length in focal length during as reproduction in the header file and the real distant view photograph, its gap is very obvious), whether can judge digital photos at an easy rate is the digital photos of reproduction.Therefore, the present invention can effectively resist the reproduction attack.
3, utilize " key is provided with function F () " to set up the ID (being the unique identifier of digital camera) of digital camera and the hidden corresponding relation between the camera key, on the one hand, realized the confidentiality and the disguise of camera key; On the other hand, according to disclosed digital camera ID, utilize " key is provided with function F () " in the Verification System to generate corresponding camera key during authentication.Simultaneously, state parameter also openly is kept in the header file of digital photos; Therefore, neither need the key transmission during authentication, also need not digital camera and participate in so that camera key to be provided.Verification System just can detect authenticity, integrality and the primitiveness of digital photos according to digital photos self, thereby has realized, efficiently verification process open, convenient to digital photos.
Embodiment
Below in conjunction with the drawings and specific embodiments the present invention is described in further detail.
Fig. 1 is the logic diagram that the moisture printing word photo of the embodiment of the invention generates.
Fig. 2 is provided with the schematic diagram of function F (k) for the key of the embodiment of the invention.
Fig. 3 is the logic diagram of the corresponding Verification System of the embodiment of the invention.
Fig. 4 is provided with function F (k) for the key in the embodiment of the invention, the camera camera key distribution map corresponding with key k of three different identity number.Among the figure, symbol " " " zero " " * " respectively representative capacity number is that three cameras of C1, C2, C3 are at the asynchronous camera key K of key k L
Embodiment
Fig. 1 illustrates, and a kind of specific embodiment of the present invention is: a kind of generation method of digital photo containing watermark of state-based parameter comprises the steps:
When 1, digital camera is taken pictures, the signal that camera lens obtains is handled through central processing unit and is obtained DID D, and the focal length when central processing unit reads digital camera and takes this photo simultaneously, aperture, time for exposure, shooting time, photosensitivity are as state parameter S.
2,, utilize key that function F (k) is set and generate camera key K according to " the camera ID C " that preserve in the digital camera read-only memory L, wherein k is a key.
The key k of " key is provided with function F (k) " is provided with jointly by Verification System and camera producer in the present embodiment, with the encrypted together digital camera inside that is packaged in of encryption key distribution function, only can be called by " hash function H () ", it is unavailable that any destruction to encapsulation will cause described key that function F (k) is set.
" key is provided with function F (k) " is used for setting up digital camera ID C (unique identifier of digital camera) and camera key K LHidden corresponding relation, i.e. K L=F (k, C).Key is provided with function and can adopts any safe Nonlinear Mapping function among the present invention.Key is provided with function employing cascade-chaotic maps as shown in Figure 2 in the present embodiment, chaotic maps f wherein adopts existing document (S.Lian, J.Sun, J.Wang, and Z.Wang A chaotic stream cipher and the usage in videoprotection, Chaos, Solitons and Fractals 34 (2007) 851-859) the middle a kind of discrete piecewise linearity chaotic maps that realizes that goes up at integer field (fixed point) that defines
Figure A20091005942100071
Wherein
Figure A20091005942100072
Expression is not more than the maximum integer of a,
Figure A20091005942100073
Expression
Figure A20091005942100074
Individual discrete state, 0 < p < 2 n 0 - 1 Be Control Parameter, n 0It is the word length of computer.Consider active computer and fail safe needs, get n in the test of back and the use 0=32.Formula (1) expression is according to Control Parameter p and state z i, can generate next state z in certainty ground I+1, initial condition z 0With Control Parameter p be the key that produces this random sequence.Present embodiment is that the unit segmentation is (if the character number among the C can not be divided exactly by 4 with camera ID C with four characters, then mend " 0 ") at the end of C, then, with the Control Parameter p that is linked as chaotic maps f of every section 4 character ASCII character, key k is as the initial condition z of first chaotic maps 0, the output of first chaotic maps is as the initial condition z of second chaotic maps 0, the output of second chaotic maps is as the initial condition z of the 3rd chaotic maps 0, by that analogy, the output of last chaotic maps is as camera key K L
3, with the state parameter S of step 1 and the camera key K of step 2 LAs expressly, utilize hash function H () to generate the authenticate key K=H (K of this digital photos L, S)." hash function H () " in the present embodiment adopts existing document (Wang Xiaomin, Zhang Wenfang, Zhang Jiashu. based on the chaos Hash function design of nonlinear digital filter, computer-aided design and graphics journal, 2006,18 (6): propose chaos hash function 870-875) based on nonlinear filter.
4, with authenticate key K as the watermark embedded key, utilize authenticating water-mark to embed among the view data D of algorithm in step (1) and embed authenticating water-mark, generate moisture printing digital image data X." watermarking algorithm " among the present invention can adopt any existing authenticating water-mark algorithm, as recovering authenticating water-mark algorithm, location type authenticating water-mark algorithm etc.
5, with moisture printing digital image data X with comprise state parameter S and the photo header file EXIF of camera ID C synthesizes photo output file Y={X, S, C} are kept in the external memory of digital camera.
Correspondingly, certification work of the present invention can be finished by authentication software system specific in the all-purpose computer, also can be finished by the particular detection device of the corresponding Verification System of assembling.Verification System be input as measured number photo files Y *={ X *, S *, C *, being output as authentication result, the encapsulation of digital camera and Verification System itself can guarantee the confidentiality of encryption key distribution function F (k).Fig. 3 illustrates, and Verification System is to digital photos Y to be measured *={ X *, S *, C *Verification process may further comprise the steps:
1, according to digital photos Y to be measured *={ X *, S *, C *, obtain the camera model C of measured number photo respectively by " data extraction " *, state parameter S *With contain watermarking images data X *
2, utilize " key is provided with function F (k) ", according to camera ID C *Generate corresponding camera key K L *
3, utilize " hash function H () ", with state parameter S *With camera key K L *For expressly, generate the authenticate key K of measured number photo *
4, utilize authenticate key K *,, provide the authentication result of measured number photo by corresponding " watermark extracting and authentication " module.The information that authentication result provided may comprise: tampering location, distort degree, distort restoration result etc., this mainly depends on the performance that adopts the authenticating water-mark algorithm in the system.
From above-mentioned verification process as can be seen, only need measured number photo itself during authentication, thereby realize open, simple and direct verification process digital photos.The fail safe of algorithm is the confidentiality of encryption key distribution function F (k) and the difficulty forgery property of authenticate key.
Performance evaluation of the present invention and Computer Simulation test:
One, performance evaluation
Among the present invention, the focal length of digital camera, aperture, time for exposure, shooting time, photosensitivity were as state parameter S and camera key K when digital photos was taken LTogether, utilize hash function to generate the authenticate key K of this digital photos.The method of above-mentioned generation digital photos authenticate key has the following advantages:
(1) realized authentication in open: utilize key that function F (k) is set and distribute camera key K for digital camera L, state parameter S and camera ID C in conjunction with openly being kept in the digital photos EXIF header file need not " asymmetric encryption " technology, just can realize the authentication in open to digital photos;
(2) increased the confidentiality of authenticate key: on the one hand, the authenticate key of digital photos all is unknown concerning anyone, has increased the confidentiality of authenticate key.On the other hand, the state parameter S when taking owing to digital photos participates in the generation of authenticate key, makes that the authenticate key of the moisture printing word photo that same digital camera obtains is different, has eliminated the condition that enforcement " is pieced attack together ";
(3) has the ability of opposing " reproduction attack ": to moisture printing word photo Y={X, S, C}, the assailant can revise digital photos data X by image editing software, and the digital photos that utilizes identical digital camera and personal information " reproduction " to distort then generates moisture printing word photo Y *={ X *, S *, C}.By optical imaging concept as can be known, the state parameter S and the S of scene imaging and photo reproduction *Very big difference is arranged.Want not stay tangible fabrication of evidence, the assailant need forge a state parameter S ' similar to S make equation H (F (and k, C), S *)=H (F (k, C), S ') set up, forge digital photos Y '={ X thereby make *, S ', C} can be by authentication.By the character of hash function as can be known, seek any plaintext m ≠ m ', make in H (m)=H (m ') calculating infeasiblely, therefore, the present invention can effectively avoid the supplier of digital photos to utilize digital camera to forge moisture printing word photo.
Two, Computer Simulation test
1, the difficulty of authenticate key forgery property
Sensitiveness is expressly illustrated the difficulty forgery property of authenticate key below by the test hash function.For ease of test, we choose initial plaintext sequence and are: " South-west Jiaotong University 2008 ".(value of (string that 16 systems are represented, authentication authorization and accounting key) is shown in second row " original ciphertext " of table 1 for the ciphertext sequence that the chaos hash function based on nonlinear filter that utilizes present embodiment to adopt generates.Test the authenticate key that obtains under following six kinds of situations then respectively:
Situation 1: first capital S changes small letter into;
Situation 2: remove word " South-west " in connector;
Situation 3: a space is added at the end at the original user key;
Situation 4: a % is added at the end at the original user key;
Situation 5: the word 2008 at deletion original user key end;
Situation 6: with word ' Jiaotong ' is revised as ' Jiao tong '.
Following two the sub-key k of table 1 different condition 1And k 2Value
Figure A20091005942100091
Table 1 has been listed the sub-key that generates under above-mentioned six kinds of situations, nearly pacing examination to the hash function characteristic sees document (Wang Xiaomin for details, Zhang Wenfang, Zhang Jiashu. based on the chaos Hash function design of nonlinear digital filter, computer-aided design and graphics journal, 2006,18 (6): 870-875).As can be seen from Table 1, do not have two similar ciphertext sequences in the table, they can be regarded as the mutual statistical independent random sequence and constitute, and therefore, the assailant is difficult to puppet and produces meaningful and equal the plaintext sequence of specific cipher text.
2, camera key K LConfidentiality
The fail safe of encryption key distribution function F (k) is the confidentiality of key k among the present invention.To specific digital camera, its camera key not only depends on camera ID C, and depends on Verification System and the common key k that is provided with of camera producer.Under the condition of key k the unknown, the camera key K that is difficult to infer this camera correspondence according to camera ID C LBe test camera key K LTo the sensitiveness of key k, select 1000 keys at random, three digital cameras to be tested, the ID of three digital cameras is respectively:
C1=‘32167Epson?Photo?PC?700/750Z’
C2=‘32166Epson?Photo?PC?700/750Z’
C3=‘321676Kodak?DC-290’
Fig. 4 is key k when getting 1000 different values, and the distribution map of three digital cameras and the corresponding camera key of key k, symbol " " " zero " " * " representative capacity respectively number be the camera key K of three cameras correspondence specific key k of C1, C2, C3 LAs seen from Figure 4, to the digital camera of above-mentioned three different identity number (C1, C2, C3), the camera key K that it is corresponding LIn integer range [0,2 32(≈ 4.295 * 10 9)] the approximate random distribution.Therefore, under the condition of key k the unknown, even the camera ID is open, the assailant also is difficult to infer or guess the camera key K that the digital camera correspondence L

Claims (1)

1, a kind of generation method of the moisture printing word photo based on state parameter comprises the steps:
When (1) digital camera is taken pictures, the signal that camera lens obtains is handled through central processing unit and is obtained DID D, and the focal length when central processing unit reads digital camera and takes this photo simultaneously, aperture, time for exposure, shooting time, photosensitivity are as state parameter S;
(2), according to " the camera ID C " that preserve in the digital camera read-only memory, utilize key that function F (k) is set and generate camera key K L, wherein k is a key;
(3), with the state parameter S of step (1) and the camera key K of step (2) LAs expressly, utilize hash function H () to generate the authenticate key K=H (K of this digital photos L, S);
(4), with authenticate key K as the watermark embedded key, utilize authenticating water-mark to embed among the view data D of algorithm in step (1) and embed authenticating water-mark, generate moisture printing digital image data X;
(5) moisture printing digital image data X being synthesized the photo output file with the photo header file EXIF that comprises state parameter S and camera ID C is kept in the external memory of digital camera.
CN2009100594210A 2009-05-26 2009-05-26 Method for generating digital photo containing watermark based on state parameter Expired - Fee Related CN101562681B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100594210A CN101562681B (en) 2009-05-26 2009-05-26 Method for generating digital photo containing watermark based on state parameter

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100594210A CN101562681B (en) 2009-05-26 2009-05-26 Method for generating digital photo containing watermark based on state parameter

Publications (2)

Publication Number Publication Date
CN101562681A true CN101562681A (en) 2009-10-21
CN101562681B CN101562681B (en) 2011-05-04

Family

ID=41221281

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100594210A Expired - Fee Related CN101562681B (en) 2009-05-26 2009-05-26 Method for generating digital photo containing watermark based on state parameter

Country Status (1)

Country Link
CN (1) CN101562681B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103646375A (en) * 2013-11-26 2014-03-19 上海交通大学 Method for authenticating primitiveness of picture photographed by intelligent mobile terminal
CN105095775A (en) * 2015-06-30 2015-11-25 努比亚技术有限公司 Method, device and terminal for realizing information safety
WO2016115888A1 (en) * 2015-01-20 2016-07-28 中兴通讯股份有限公司 Photograph capturing method, image viewing method, system, and terminal
CN106778108A (en) * 2017-03-09 2017-05-31 深圳峰创智诚科技有限公司 Generate the method and device of digital certificates
CN108650099A (en) * 2018-05-22 2018-10-12 深圳华博高科光电技术有限公司 Picture authorization identifying opens the method, apparatus consulted and storage medium
CN108876697A (en) * 2018-06-22 2018-11-23 南开大学 Pixel-level image certification, tampering detection and restoration methods
WO2019061185A1 (en) * 2017-09-28 2019-04-04 深圳传音通讯有限公司 Method and terminal for digitally signing picture

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103646375A (en) * 2013-11-26 2014-03-19 上海交通大学 Method for authenticating primitiveness of picture photographed by intelligent mobile terminal
CN103646375B (en) * 2013-11-26 2017-06-13 上海交通大学 The identifiable method of photo primitiveness that intelligent mobile terminal is taken pictures
WO2016115888A1 (en) * 2015-01-20 2016-07-28 中兴通讯股份有限公司 Photograph capturing method, image viewing method, system, and terminal
CN105095775A (en) * 2015-06-30 2015-11-25 努比亚技术有限公司 Method, device and terminal for realizing information safety
CN105095775B (en) * 2015-06-30 2018-07-31 努比亚技术有限公司 Implementation method, device and the terminal of information security
CN106778108A (en) * 2017-03-09 2017-05-31 深圳峰创智诚科技有限公司 Generate the method and device of digital certificates
WO2019061185A1 (en) * 2017-09-28 2019-04-04 深圳传音通讯有限公司 Method and terminal for digitally signing picture
CN108650099A (en) * 2018-05-22 2018-10-12 深圳华博高科光电技术有限公司 Picture authorization identifying opens the method, apparatus consulted and storage medium
CN108650099B (en) * 2018-05-22 2020-12-01 深圳华博高科光电技术有限公司 Method, device and storage medium for picture authorization authentication and opening lookup
CN108876697A (en) * 2018-06-22 2018-11-23 南开大学 Pixel-level image certification, tampering detection and restoration methods
CN108876697B (en) * 2018-06-22 2022-02-25 南开大学 Pixel-level image authentication, tampering detection and recovery method

Also Published As

Publication number Publication date
CN101562681B (en) 2011-05-04

Similar Documents

Publication Publication Date Title
CN101562681B (en) Method for generating digital photo containing watermark based on state parameter
Muhammad et al. Secure surveillance framework for IoT systems using probabilistic image encryption
CN106251278B (en) A kind of image encryption domain reversible information hidden method based on histogram feature
CN1209730C (en) Digital anti-fake method
CN104077624A (en) Methods and systems for generating and checking electronic note with anti-counterfeiting two-dimension code
CN104636764B (en) A kind of image latent writing analysis method and its device
Kekre et al. Comparison between the basic LSB replacement technique and increased capacity of information hiding in LSB’s method for images
Ahmed et al. Hash-based authentication of digital images in noisy channels
CN104517257A (en) Method for manufacturing and verifying anti-counterfeiting digital certificate
Srivastava et al. Data Hiding using Image Steganography
Barani et al. A secure watermark embedding approach based on chaotic map for image tamper detection
Das et al. Digital forensic enabled image authentication using least significant bit (lsb) with tamper localization based hash function
Kayani et al. Efficient region of interest encryption based on a new chaotic map
Li et al. Reversible data hiding for encrypted 3D model based on prediction error expansion
Sun et al. The detecting system of image forgeries with noise features and EXIF information
Bucerzan et al. Contributions to steganographic techniques on mobile devices
Nagm et al. A novel watermarking approach for protecting image integrity based on a hybrid security technique
Blackledge Information hiding using stochastic diffusion for the covert transmission of encrypted images
Li et al. A novel image encryption scheme based on hyperchaos and random overlapping diffusion
Li Secure Reversible Data Hiding in Images with Scalable Capacity
Hu et al. Secure architecture and protocols for robust perceptual hashing
Hegde et al. Exploring the Effectiveness of Steganography Techniques: A Comparative Analysis
Michael et al. A cost effective image steganography application for document security
CN101021938B (en) Safety image identifying method based on breakable watermark and value merge technique
Gao et al. Reversible Multiple Items Authentication Scheme for WSNs

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110504

Termination date: 20140526