CN102142129B - Visual secret sharing-based image content tampering detection method - Google Patents

Visual secret sharing-based image content tampering detection method Download PDF

Info

Publication number
CN102142129B
CN102142129B CN2011100564119A CN201110056411A CN102142129B CN 102142129 B CN102142129 B CN 102142129B CN 2011100564119 A CN2011100564119 A CN 2011100564119A CN 201110056411 A CN201110056411 A CN 201110056411A CN 102142129 B CN102142129 B CN 102142129B
Authority
CN
China
Prior art keywords
image
algorithm
watermark
original
watermarking images
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2011100564119A
Other languages
Chinese (zh)
Other versions
CN102142129A (en
Inventor
王晓峰
王尚平
张亚玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Technology
Original Assignee
Xian University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Technology filed Critical Xian University of Technology
Priority to CN2011100564119A priority Critical patent/CN102142129B/en
Publication of CN102142129A publication Critical patent/CN102142129A/en
Application granted granted Critical
Publication of CN102142129B publication Critical patent/CN102142129B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a visual secret sharing-based image content tampering detection method. The method comprises the following steps of: generating a watermarking image by using copyright information of the image; generating a verification shadow and a detection shadow by combining the content characteristic of the image; recovering a water mark from the verification shadow and the detection shadow by using a visual secret sharing technology; and comparing the recovered water mark with the original watermarking to determine whether the image is tampered so as to realize tampering detection and determine the position of a tampered region. In the method, the watermarking image is generated by using the copyright information of the image without embedding and extracting the watermarking, but the tampering detection of image content is realized by using the visual secret sharing technology on the premise of not damaging the original image data.

Description

A kind of based on the secret picture material altering detecting method of sharing of vision
Technical field
The invention belongs to the multi-media information security technical field, be specifically related to a kind of based on the secret picture material altering detecting method of sharing of vision.
Background technology
Along with developing rapidly of network technology and digitizing technique, the interchange of multimedia messages has reached unprecedented range.The application of the development of while image processing techniques and powerful image editing software makes domestic consumer can edit, distort raw image data easily, makes the effect of mixing the spurious with the genuine.This has reduced the credibility of multi-medium data itself to a great extent, has overturned people's's in the eyes of " seeing is believing " traditional concept for a long time.How to realize that the content integrity authentication of digital picture becomes the popular research topic in multi-media information security field.
Image digital watermark is a kind of image integrity authentication and copyright protection technology commonly used.Like number of patent application is 200610036388.6 to have announced " a kind of reversible water mark method that is used for image authentication "; High-frequency sub-band histogram through revising image with the SHA-256 cryptographic hash of original image be used for the image data recovered and embed high-frequency sub-band; Lowest bit plane through the replacement low frequency sub-band embeds low frequency sub-band with significant watermark; Distort detection and location according to the differential chart of the watermark of extracting or watermark of extracting and former watermark, the cryptographic hash of relatively extracting and the cryptographic hash of image restored are carried out the content integrity checking.Yet, use traditional digital watermark, need algorithm for design that watermark information is embedded in the original artwork, if containing much information of embedding influences visual effect; If the amount of information that embeds is little, then relatively be easy to extract, do not reach the fail safe of expection.So, not only when embedding and extract, increased computation complexity, and, in image, embedded watermark, changed the raw information of image, destroyed the integrality of original artwork to a certain extent.Therefore, how neither in image, embedding any information, can realize content integrity authentication and copyright protection to original artwork again, is a challenging research topic.
In order to address this problem; People such as Chuen-Ching Wang have proposed a New Scheme of Image Watermarking of learning (Visual Cryptography) based on visual cryptography; Its basic thought is different from traditional watermarking project; No longer need watermark be embedded in the original image; But utilize secret (the VSS:Visual secret sharing) technology of sharing of vision that watermarking images is divided into two parts, and the information of wherein a part of watermark is combined with the main information of original image, obtain an image that contains watermark; The recovery stage is from the image that contains watermark, to recover that a part of watermark information, overlaps on another part watermark information, thus the ownership of authentication image.Philtrums such as Hsieh have proposed a gray level image copyright protection scheme of sharing based on secret; This scheme is utilized wavelet transform to extract the characteristic of original image and it is combined with watermark information; Generate the shadow image, need not design the embedding algorithm of watermark equally.2005, they expanded to the coloured image copyright protection to this method again.Above scheme need not embed any information in original artwork, can realize image copyright protection, compares with traditional water mark method, has reduced computation complexity and has kept the integrality of original image.But above method all can only realize copyright protection, does not have the integrated authentication function of image.In addition, also have shortcoming in various degree respectively, people's such as Chuen-Ching Wang operation is carried out on the spatial domain; Its shortcoming is a little less than the image processing operations robustness to routine; People's such as Hsieh method all is on transform domain, image to be handled, but the algorithm more complicated, its method has expanded to the coloured image copyright protection; Also just simply gray level image has been extended to coloured image, has not significantly upgraded on the algorithm; And the method in the coloured image copyright protection need become YCbCr with the RGB mode switch of coloured image.
Summary of the invention
The purpose of this invention is to provide a kind of based on the secret picture material altering detecting method of sharing of vision; Utilize the copyright information of image to generate watermarking images; Do not need watermark embedding and watermark extracting; But utilize the secret technology of sharing of vision, and raw image data is not being produced under the prerequisite of any destruction, realize the detection of distorting simultaneously to picture material.
The technical scheme that the present invention adopted is that a kind of picture material altering detecting method of sharing based on the vision secret may further comprise the steps:
Information sender:
Step 1, for given original image I 0, extract original image characteristic F with feature extraction algorithm 0
Step 2, utilize original image I 0Copyright information generate original watermark image W 0, encrypt original watermark image W with AES again 0, generate encrypted watermark image W E
Step 3, the original image characteristic F that utilizes step 1 to obtain 0And the encrypted watermark image W that obtains of step 2 E, generate checking shadow S through AES Algorithm 3 1
The receiving party:
Step 4, for the test pattern I that receives t, extract detected image characteristic F with feature extraction algorithm t
Step 5, the detected image characteristic F that utilizes step 4 to obtain tAnd the encrypted watermark image W that obtains of step 2 E, generate detection shadow S through algorithm Algorithm 4 2
Step 6, the checking shadow S that utilizes step 3 to obtain 1And the detection shadow S that obtains of step 5 2,, generate recovery watermarking images W through watermark recovery algorithm Algorithm 5 R
Step 7, the recovery watermarking images W that utilizes decipherment algorithm decryption step 6 to obtain R, generate and detect watermarking images W D
Step 8, the detection watermarking images W that step 7 is obtained DThe original watermark image W that obtains with step 2 0Compare, if detect watermarking images W DWith original watermark image W 0Visual effect is identical, then shows test pattern I tBe by original image I 0Through obtaining after the normal image processing operational processes; If detect watermarking images W DSerious distortion then shows and detects watermarking images W DBe the image of malice after distorting, and according to watermarking images W DTest pattern I is confirmed in the position of distortion tBy the tampered region.
The invention has the beneficial effects as follows the following deficiency that has solved existing correlation technique:
(1) solved deficiency based on the image authentication method of digital watermarking, do not needed watermarking algorithm and watermark extracting algorithm, at the bottom of the computation complexity, efficient is high.
(2) raw image data is not being produced under the prerequisite of any destruction, realizing the detection of distorting simultaneously, to realize copyright protection to picture material.
(3) the present invention can directly apply to coloured image, need not carry out the conversion of color mode.
(4) method of the present invention for JPEG compression, image sharpening, interpolation noise, slightly rotate normal image such as convergent-divergent and handle operation and have robustness.
(5) malice is distorted have sensitiveness, can confirm by the position of tampered region.
(6), thereby has stronger practicality because method of the present invention has higher fail safe and efficient.
Description of drawings
Fig. 1 is the flow chart that the present invention is based on the secret picture material altering detecting method of sharing of vision;
Fig. 2 is that quality factor is the image that obtains in the content tampering testing process of 20 jpeg compressed image, and wherein, a is original image I 0, b is original watermark image W 0, c is encrypted watermark image W E, d is checking shadow S 1, e is for detecting shadow S 2, f is for recovering watermarking images W R, g is test pattern I t, h is for detecting watermarking images W D
Fig. 3 is that quality factor is the image that obtains in the content tampering testing process of 60 jpeg compressed image, and wherein, a is original image I 0, b is original watermark image W 0, c is encrypted watermark image W E, d is checking shadow S 1, e is for detecting shadow S 2, f is for recovering watermarking images W R, g is test pattern I t, h is for detecting watermarking images W D
Fig. 4 detects figure for the content tampering to gray level image, and a is test pattern I t, b is the tampering location result;
Fig. 5 detects figure for the content tampering to coloured image, and a is test pattern I t, b is the tampering location result.
Embodiment
Below in conjunction with accompanying drawing and embodiment the present invention is elaborated.
As shown in Figure 1, the present invention is a kind of based on the secret picture material altering detecting method of sharing of vision, may further comprise the steps:
Information sender:
Step 1, for given original image I 0, extract original image characteristic F with feature extraction algorithm Algorithm 1 0
Wherein, the feature extraction algorithm Algorithm in the step 11 is:
The original image I of the N * N of input 0Be divided into 8 * 8 not overlapping block, obtain N 2/ 64 image blocks are expressed as I Ij, i=1 wherein, 2 ..., N/8, j=1,2 ..., N/8; Each image block is carried out 3 grades of db1 wavelet decomposition, obtain the LL of each 8 * 8 image block 3Subband wavelet coefficient a Ij(i=1,2 ..., N/8, j=1,2 ..., N/8), generate original image characteristic F 0:
F 0 = a 11 . . . a 1 n . . . . . . . . . a n 1 . . . a Nn , N=N/8 wherein.
Step 2, utilize original image I 0Copyright information generate original watermark image W 0, encrypt original watermark image W with AES Algorithm 2 again 0, generate encrypted watermark image W E
AES Algorithm 2 in the step 2 is:
Wherein, utilize original image I 0Copyright information generate the original watermark image W of N/8 * N/8 0, construct a N/8-rank magic square matrix, through K (K<(N/8) 2) after the magic square conversion, obtain encrypted watermark image W EWherein, K is given watermark keys, encrypted watermark image W EBe a binary matrix:
W E = w 11 . . . w 1 n . . . . . . . . . w n 1 . . . w Nn , N=N/8 wherein, w Ij∈ (0,1).
Step 3, the original image characteristic F that utilizes step 1 to obtain 0And the encrypted watermark image W that obtains of step 2 E,, generate checking shadow S through AES Algorithm 3 1
Wherein, the AES Algorithm in the step 33 is:
At first, the characteristics of image F that obtains of calculation procedure 1 0Average M 0: M 0 = a 11 + . . . + a 1 ( N / 8 ) + . . . + a ( N / 8 ) 1 + . . . + a ( N / 8 ) ( N / 8 ) ( N / 8 ) × ( N / 8 ) ;
Secondly, S 1 = s 11 . . . s 1 n . . . . . . . . . s n 1 . . . s Nn = F 0 e 1 W E = a 11 e 1 w 11 . . . a 1 n e 1 w 1 n . . . . . . . . . a n 1 e 1 w n 1 . . . a Nn e 1 w Nn
Wherein, n=N/8, algorithm " e 1" definition rule be:
w ij=1 w ij=0
a ij<M 0 s ij=1 s ij=0
a ij>M 0 s ij=0 s ij=1
The receiving party:
Step 4, for the test pattern I that receives t, extract detected image characteristic F with feature extraction algorithm Algorithm 1 t
Wherein, the algorithm Algorithm in the step 41 is:
The test pattern I of the N * N that receives tBe divided into 8 * 8 not overlapping block, obtain N 2/ 64 image blocks carry out 3 grades of db1 wavelet decomposition to each image block, obtain the LL of each 8 * 8 image block 3Subband wavelet coefficient b Ij(i=1,2 ..., N/8, j=1,2 ..., N/8), generate detected image characteristic F t:
F t = b 11 . . . b 1 n . . . . . . . . . b n 1 . . . b Nn , N=N/8 wherein.
Step 5, the detected image characteristic F that utilizes step 4 to obtain tAnd the encrypted watermark image W that obtains of step 2 E,, generate detection shadow S through algorithm Algorithm 4 2
Wherein, the algorithm Algorithm in the step 54 is:
At first, the detected image characteristic F that obtains of calculation procedure 4 tAverage M t: M t = b 11 + . . . + b 1 ( N / 8 ) + . . . + b ( N / 8 ) 1 + . . . + b ( N / 8 ) ( N / 8 ) ( N / 8 ) × ( N / 8 ) ;
Secondly, S 2 = t 11 . . . t 1 n . . . . . . . . . t n 1 . . . t Nn = F t e 2 W E = b 11 e 2 w 11 . . . b 1 n e 2 w 1 n . . . . . . . . . b n 1 e 2 w n 1 . . . b Nn e 2 w Nn ,
Wherein, n=N/8, algorithm " e 2" definition rule be:
w ij=1 w ij=0
b ij<M t t ij=0 t ij=0
b ij>M t t ij=1 t ij=1
Step 6, the checking shadow S that utilizes step 3 to obtain 1And the detection shadow S that obtains of step 5 2,, generate recovery watermarking images W through watermark recovery algorithm Algorithm 5 R
Wherein, the watermark recovery algorithm Algorithm 5 in the step 6 is:
W R = w R 11 . . . w R 1 n . . . . . . . . . w Rn 1 . . . w Rnn = S 1 e 3 S 2 = s 11 e 3 t 11 . . . s 1 n e 3 t 1 n . . . . . . . . . s n 1 e 3 t n 1 . . . s nn e 3 t nn ,
Wherein, n=N/8, algorithm " e 3" definition rule be:
s ij t ij s ij?e 3?t ij
0 1 1
1 0 1
1 1 0
0 0 0
Step 7, the recovery watermarking images W that utilizes decipherment algorithm Algorithm 6 decryption step 6 to obtain R, generate and detect watermarking images W D
Wherein, the decipherment algorithm Algorithm in the step 76 is: utilize watermarking images W RConstruct a N/8-rank magic square matrix, carry out K contrary magic square conversion.
Step 8, the detection watermarking images W that step 7 is obtained DThe original watermark image W that obtains with step 2 0Compare: if detect watermarking images W DWith original watermark image W 0Visual effect is identical, then shows test pattern I tBe by original image I 0Through obtaining after the normal image processing operational processes; If detect watermarking images W DSerious distortion then shows and detects watermarking images W DBe the image of malice after distorting, and according to watermarking images W DTest pattern I is confirmed in the position of distortion tBy the tampered region.
As shown in the table is the comparison of method of the present invention and existing technologies:
Figure BDA0000049451610000081
In last table, the function that " √ " expression algorithm has; The function that " * " expression algorithm does not have.Can find out that method of the present invention also has the positioning function in the field of distorting except the function that has existing technologies and have.
As shown in Figure 2, be that quality factor is the image that obtains in the content tampering testing process of 20 jpeg compressed image.Fig. 3 is that quality factor is the image that obtains in the content tampering testing process of 60 jpeg compressed image, and in Fig. 2 and Fig. 3, a is given original image I 0B is the original watermark image W that step 2 generates 0C is the encrypted watermark image W that step 2 generates ED is the checking shadow S that step 3 generates 1E is the detection shadow S that step 5 generates 2F is the recovery watermarking images W that step 6 generates RG is test pattern I t, h is the detection watermarking images W that step 7 generates DThe picture material that draws Fig. 2 and Fig. 3 through comparison b and h is distorted test result and is: test pattern I tBe by original image I 0Through obtaining after the normal image processing operational processes.
Fig. 4 detects figure for the content tampering to gray level image, and a is test pattern I t, b is the tampering location result.Fig. 5 detects figure for the content tampering to coloured image, and a is test pattern I t, b is the tampering location result.

Claims (1)

1. one kind based on the secret picture material altering detecting method of sharing of vision, it is characterized in that may further comprise the steps:
Information sender:
Step 1, for given original image I 0, extract original image characteristic F with feature extraction algorithm 0:
Used feature extraction algorithm is:
The original image I of the N * N of input 0Be divided into 8 * 8 not overlapping block, obtain N 2/ 64 image blocks are expressed as I Ij, i=1 wherein, 2 ..., N/8, j=1,2 ..., N/8; Each image block is carried out 3 grades of db1 wavelet decomposition, obtain the LL of each 8 * 8 image block 3Subband wavelet coefficient a Ij, wherein, i=1,2 ..., N/8, j=1,2 ..., N/8 generates original image characteristic F 0:
F 0 = a 11 . . . a 1 n . . . . . . . . . a n 1 . . . a Nn , N=N/8 wherein;
Step 2, utilize original image I 0Copyright information generate original watermark image W 0, encrypt original watermark image W with AES Algorithm 2 again 0, generate encrypted watermark image W E:
Used AES Algorithm 2 is:
Utilize original image I 0Copyright information generate the original watermark image W of N/8 * N/8 0, construct a N/8-rank magic square matrix, through after K the magic square conversion, obtain encrypted watermark image W E, wherein, K is given watermark keys, K<(N/8) 2, encrypted watermark image W EBe a binary matrix:
W E = w 11 . . . w 1 n . . . . . . . . . w n 1 . . . w Nn , N=N/8 wherein, w Ij∈ (0,1);
Step 3, the original image characteristic F that utilizes step 1 to obtain 0And the encrypted watermark image W that obtains of step 2 E, generate checking shadow S through AES Algorithm 3 1, wherein, said AES Algorithm 3 is:
At first, the characteristics of image F that obtains of calculation procedure 1 0Average M 0: M 0 = a 11 + . . . + a 1 ( N / 8 ) + . . . + a ( N / 8 ) 1 + . . . + a ( N / 8 ) ( N / 8 ) ( N / 8 ) × ( N / 8 ) ;
Secondly, S 1 = s 11 . . . s 1 n . . . . . . . . . s n 1 . . . s Nn = F 0 e 1 W E = a 11 e 1 w 11 . . . a 1 n e 1 w 1 n . . . . . . . . . a n 1 e 1 w n 1 . . . a Nn e 1 w Nn
Wherein, n=N/8, algorithm " e 1" definition rule be:
w ij=1 w ij=0 a ij<M 0 s ij=1 s ij=0 a ij>M 0 s ij=0 s ij=1
The receiving party:
Step 4, for the test pattern I that receives t, extract detected image characteristic F with feature extraction algorithm t, wherein, used feature extraction algorithm is:
The test pattern I of the N * N that receives tBe divided into 8 * 8 not overlapping block, obtain N 2/ 64 image blocks carry out 3 grades of db1 wavelet decomposition to each image block, obtain the LL of each 8 * 8 image block 3Subband wavelet coefficient b Ij, wherein, i=1,2 ..., N/8, j=1,2 ..., N/8 generates detected image characteristic F t:
F t = b 11 . . . b 1 n . . . . . . . . . b n 1 . . . b Nn , N=N/8 wherein;
Step 5, the detected image characteristic F that utilizes step 4 to obtain tAnd the encrypted watermark image W that obtains of step 2 E, generate detection shadow S through algorithm Algorithm 4 3, wherein, said algorithm Algorithm4 is:
At first, the detected image characteristic F that obtains of calculation procedure 4 tAverage M t: M t = b 11 + . . . + b 1 ( N / 8 ) + . . . + b ( N / 8 ) 1 + . . . + b ( N / 8 ) ( N / 8 ) ( N / 8 ) × ( N / 8 ) ;
Secondly, S 2 = t 11 . . . t 1 n . . . . . . . . . t n 1 . . . t Nn = F t e 2 W E = b 11 e 2 w 11 . . . b 1 n e 2 w 1 n . . . . . . . . . b n 1 e 2 w n 1 . . . b Nn e 2 w Nn ,
Wherein, n=N/8, algorithm " e 2" definition rule be:
w ij=1 w ij=0 b ij<M t t ij=0 t ij=0 b ij>M t t ij=1 t ij=1
Step 6, the detection shadow S that utilizes checking shadow S1 that step 3 obtains and step 5 to obtain 2,, generate the recovery watermarking images through watermark recovery algorithm Algorithm 5 WR, wherein, said watermark recovery algorithm Algorithm 5 is:
W R = w R 11 . . . w R 1 n . . . . . . . . . w Rn 1 . . . w Rnn = S 1 e 3 S 2 = s 11 e 3 t 11 . . . s 1 n e 3 t 1 n . . . . . . . . . s n 1 e 3 t n 1 . . . s nn e 3 t nn ,
Wherein, n=N/8, algorithm " e 3" definition rule be:
s ij t ij s ije 3t ij 0 1 1 1 0 1 1 1 0 0 0 0
Step 7, the recovery watermarking images W that utilizes decipherment algorithm decryption step 6 to obtain R, generate and detect watermarking images W D, wherein, said decipherment algorithm is: utilize watermarking images W RConstruct a N/8-rank magic square matrix, carry out K contrary magic square conversion, wherein, K is given watermark keys, K<(N/8) 2
Step 8, the detection watermarking images W that step 7 is obtained DThe original watermark image W that obtains with step 2 0Compare, if detect watermarking images W DWith original watermark image W 0Visual effect is identical, then shows test pattern I tBe by original image I 0Through obtaining after the normal image processing operational processes; If detect watermarking images W DSerious distortion then shows and detects watermarking images W DBe the image of malice after distorting, and according to watermarking images W DTest pattern I is confirmed in the position of distortion tBy the tampered region.
CN2011100564119A 2011-03-09 2011-03-09 Visual secret sharing-based image content tampering detection method Expired - Fee Related CN102142129B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011100564119A CN102142129B (en) 2011-03-09 2011-03-09 Visual secret sharing-based image content tampering detection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100564119A CN102142129B (en) 2011-03-09 2011-03-09 Visual secret sharing-based image content tampering detection method

Publications (2)

Publication Number Publication Date
CN102142129A CN102142129A (en) 2011-08-03
CN102142129B true CN102142129B (en) 2012-07-04

Family

ID=44409618

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100564119A Expired - Fee Related CN102142129B (en) 2011-03-09 2011-03-09 Visual secret sharing-based image content tampering detection method

Country Status (1)

Country Link
CN (1) CN102142129B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104869432B (en) * 2015-05-14 2017-10-27 邓家先 A kind of image multiresolution compression encryption and classification decryption and display methods
CN106126978B (en) * 2016-06-30 2018-10-19 中南大学 The lossless digital copyright management method of eye fundus image based on fingerprint Yu zero watermarking mixed architecture
CN107070638B (en) * 2017-04-20 2020-06-23 上海海洋大学 Ocean remote sensing image secret sharing method of dynamic weighting threshold
CN110278074B (en) * 2018-03-16 2022-11-11 临沂大学 Visual secret sharing method for image encryption
CN110602349B (en) * 2019-08-27 2021-07-02 成都信息工程大学 Method for security protection of associated image content
CN113327105B (en) * 2021-08-03 2021-10-19 杭州志卓科技股份有限公司 B2B online payment transaction method based on digital image processing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1440196A (en) * 2003-04-03 2003-09-03 上海交通大学 Digital watermark implanting and extracting method based on parth search
CN101567958A (en) * 2009-05-19 2009-10-28 杭州海康威视软件有限公司 Semi-fragile digital watermaking system based on non-redundant Contourlet conversion
CN101866477A (en) * 2010-06-11 2010-10-20 山东大学 Digital blind watermarking method for double protection of image integrity

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6504941B2 (en) * 1998-04-30 2003-01-07 Hewlett-Packard Company Method and apparatus for digital watermarking of images
US20030070075A1 (en) * 2001-10-04 2003-04-10 Frederic Deguillaume Secure hybrid robust watermarking resistant against tampering and copy-attack

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1440196A (en) * 2003-04-03 2003-09-03 上海交通大学 Digital watermark implanting and extracting method based on parth search
CN101567958A (en) * 2009-05-19 2009-10-28 杭州海康威视软件有限公司 Semi-fragile digital watermaking system based on non-redundant Contourlet conversion
CN101866477A (en) * 2010-06-11 2010-10-20 山东大学 Digital blind watermarking method for double protection of image integrity

Also Published As

Publication number Publication date
CN102142129A (en) 2011-08-03

Similar Documents

Publication Publication Date Title
Chang et al. A secure fragile watermarking scheme based on chaos-and-hamming code
Xuehua Digital watermarking and its application in image copyright protection
CN102142129B (en) Visual secret sharing-based image content tampering detection method
CN102208097B (en) Network image copyright real-time distinguishing method
CN107742272A (en) A kind of semi-fragile watermarks method for positioning and recovering based on distorted image
Azeroual et al. Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet
Hadmi et al. Perceptual image hashing
CN105634732A (en) Ciphertext domain multi-bit reversible information hiding method
Hu et al. Dual-wrapped digital watermarking scheme for image copyright protection
Alam et al. Key dependent image steganography using edge detection
CN104063731A (en) Two-dimension code anti-counterfeiting printing and verification method adopting digital watermark technology
Yuan et al. Gauss–Jordan elimination-based image tampering detection and self-recovery
CN110136045B (en) Method for hiding and recovering based on mutual scrambling of two images
Ni et al. Pinpoint authentication watermarking based on a chaotic system
Riaz et al. Image authentication and restoration by multiple watermarking techniques with advance encryption standard in digital photography
Kaur et al. XOR-EDGE based video steganography and testing against chi-square steganalysis
Sethi et al. Video security against deepfakes and other forgeries
CN103617589A (en) Information hiding method based on local histogram
Zhang et al. An improved secure semi-fragile watermarking based on LBP and Arnold transform
Shukla Non-separable histogram based reversible data hiding approach using inverse S-order and skew tent map
Mathivadhani et al. Digital watermarking and information hiding using wavelets, SLSB and Visual cryptography method
Bhattacharyya et al. Watermarking Using Multiresolution Cosine Transformation: A Review
Raju et al. Modified encryption standard for reversible data hiding using AES and LSB steganography
Kaur et al. Steganography using RSA algorithm
Tsai et al. A watermarking-based authentication with malicious detection and recovery

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120704

Termination date: 20150309

EXPY Termination of patent right or utility model