CN102509257A - Human visual characteristic compressive sensing-based grayscale image tampering and detection method - Google Patents

Human visual characteristic compressive sensing-based grayscale image tampering and detection method Download PDF

Info

Publication number
CN102509257A
CN102509257A CN2011103769712A CN201110376971A CN102509257A CN 102509257 A CN102509257 A CN 102509257A CN 2011103769712 A CN2011103769712 A CN 2011103769712A CN 201110376971 A CN201110376971 A CN 201110376971A CN 102509257 A CN102509257 A CN 102509257A
Authority
CN
China
Prior art keywords
image
matrix
piecemeal
aug
compressed sensing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011103769712A
Other languages
Chinese (zh)
Other versions
CN102509257B (en
Inventor
张爱新
丁霄云
李建华
李生红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiaotong University
Original Assignee
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jiaotong University filed Critical Shanghai Jiaotong University
Priority to CN 201110376971 priority Critical patent/CN102509257B/en
Publication of CN102509257A publication Critical patent/CN102509257A/en
Application granted granted Critical
Publication of CN102509257B publication Critical patent/CN102509257B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a human visual characteristic compressive sensing-based grayscale image tampering and detection method, which comprises the following steps of: (1) generation and transmission of a watermark of an image: prior to the transmission of the image, a sending terminal firstly generates a Hash value of the image by using a human visual characteristic compressive sensing-based sparse base change and measurement matrix, then, transmits the Hash value through a secure channel, and transmits the image to a receiving terminal through a public channel; (2) image detection of the receiving terminal: the receiving terminal verifies whether the image obtained from the public channel is tampered or not by using the watermark of the image received from a trusted channel; and (3) tamper localization of the receiving terminal: after the condition that the received image is maliciously tampered is judged by the receiving terminal, a compressive sensing orthogonal matching pursuit reconstruction method is further used for restoring a difference value D, and therefore, an image E of a tampered position is obtained. Compared with the prior art, the human visual characteristic compressive sensing-based grayscale image tampering and detection method has the advantages of high rate in detection, low quantity in transmission, fastness in computation and the like.

Description

Gray level image altering detecting method based on the human visual system compressed sensing
Technical field
The present invention relates to technical field of image processing, especially relate to a kind of gray level image altering detecting method based on the human visual system compressed sensing.
Background technology
It is a kind of copyright protection technology of digital product that distorted image detects.Its core concept is: some identification informations (being digital watermarking) are directly embedded in the secondary indication (as revising the structure of specific region) of digital carrier (like multimedia, document, software etc.) or Digital Media; And do not influence the use value of original vector; Also be not easy to be found out and revise once more, but can be by producer identification and identification.Be hidden in the information in the carrier through these, can reach and confirm creator of content, buyer, transmission secret information or judge whether carrier purpose such as is distorted.Digital watermarking is a research direction of Information Hiding Techniques, also is the effective way that realizes copyright protection.
Compressed sensing is the signals collecting of a novelty and the theory of processing, and it is made up of sparse basic conversion, measurement matrix and signal reconstruction three parts.The basis of this theory is if signal is compressible or is sparse at certain transform domain; So just can use one with higher-dimension signal projection to the lower dimensional space of the incoherent observing matrix of transform-based with the conversion gained on, from the projection of these lower dimensional spaces, reconstruct original signal through finding the solution an optimization problem then with high probability.
Find through literature search; People such as M.Tagliasacchi, G.Valenzise and S.Tubaro are at paper " Localization of sparse image tampering via random projections " (" based on the discrete picture tampering location of stochastic sampling ") (IEEE International Conference on Image Processing; Pp.2092-2095 Oct.2008) has proposed the method that a kind of distorted image detects in (international conference of IEEE Flame Image Process).Wherein, transmitting terminal carries out accidental projection to original image information, and the compression measured value that obtains is carried out behind the distributed coding afterwards this Hash eigenwert being sent to Verification System through safe lane as the Hash eigenwert of original image again.Verification System according to the image Hash eigenwert that is received by safe lane, judges whether this image was distorted after receiving image information.If receive and distort attack, and tampered position is sparse on spatial domain, the reconstructing method positioning tampering information in the compressed sensing theory then capable of using.Emulation experiment shows that this method not only can reduce computing and transmission cost, also has and distorts detectability preferably.The outstanding feature of above-mentioned distorted image detection scheme is to have adopted compressed sensing theoretical.Because compressed sensing does not need scanning picture in high-frequency ground just can write down and recover this width of cloth picture, therefore need have remarkable advantages to the application that the view picture picture scans and handles like this for digital watermarking afterwards.
But the adaptive disposal route of compressed sensing right and wrong needs when specifically using to select different sparse bases, measure matrix and reconfiguration scheme according to different scene, this to a great extent limit the application performance of compressed sensing; Simultaneously, because how the human visual perception characteristic uses the responsive zone of human eye perception with Limited resources to greatest extent, also be the great approach of lifting scheme performance.This patent emphasis is proposing a kind of improved image watermark method based on compressed sensing.
Find through the document retrieval in addition,, then can effectively promote the recovery effects of image if human visual system is introduced in the compressed sensing.YingYu; People such as BinWang are at paper " Saliency-Based Compressive Sampling for image signals [C] " (" based on the compression of images perception studies of area-of-interest ") (IEEE SIGNAL PROCESSING LETTERS; Vol.17; No.11, pp.973-976 Sep.2010) points out in (IEEE signal Processing proceedings) that the responsive marking area of human vision can be broadly described as one group of statistical information.The compression of images perception framework based on area-of-interest that the document proposes mainly comprises 3 parts: at first image is analyzed and generated an area-of-interest mapping table; According to this mapping table,, calculate the compressed sensing measurement parameter of each piece successively then, generate and measure matrix, carry out the compressed sensing sampling the picture piecemeal; Use the compressed sensing recovery algorithms to carry out image reconstruction at last.Area-of-interest mapping table in the scheme is the core of entire method, and can the quality of this mapping table have determined distribute rational resource to give the emphasis part of human vision, therefore determined the quality of image recovery effects.
The focusing on of this patent is applied to gray level image with above-mentioned compression of images aware scheme based on area-of-interest and distorts in the testing process, detects effect with further reinforcement distorted image.
Summary of the invention
The object of the invention is exactly the gray level image altering detecting method based on the human visual system compressed sensing that a kind of high detection rate, the throughput rate of passing at the low, fast computing are provided for the defective that overcomes above-mentioned prior art existence.
The object of the invention can be realized through following technical scheme:
A kind of gray level image altering detecting method based on the human visual system compressed sensing is characterized in that, may further comprise the steps:
1) image watermark generates and transmission, and transmitting terminal at first generated the cryptographic hash of this image before images, through safe lane transmission cryptographic hash, gives receiving end through the overt channel images then;
2) receiving end image detection, the image watermark that the receiving end utilization is received by trusted channel, whether the image that checking is obtained by overt channel has passed through is distorted;
3) receiving end tampering location; After receiving end is judged received image and is maliciously tampered, further utilize orthogonal matching pursuit (Orthogonal Matching Pursuit, the OMP) reconstructing method of compressed sensing; D recovers with difference, thereby obtains tampered position image E.
Described step 1) is specific as follows:
11) generating the area-of-interest mapping graph of image, specifically is that the dct transform gene polyadenylation signal to image carries out standardization;
For a given gray-scale map X ∈ R N * N, wherein n=N * N is total pixel of image, it is significantly schemed Map and is produced by following process:
P=sign(C(X))
F=abs(C -1(P))
Map=G*F 2
Wherein C (X) and C -1(P) two-dimensional dct transform and the inverse transformation thereof of presentation video respectively, sign (C (X)) is-symbol function, abs (C -1(P)) be the function that takes absolute value, G is two-dimentional gauss low frequency filter, and the element of significantly scheming among the Map is designated as Map i(1≤i≤n);
12) image is carried out piecemeal and handle, at first, the fixed size that segments the image into non-overlapping copies is the piecemeal of m=B * B, and establishing i piecemeal is B i, wherein, 1≤i≤n/m supposes that n can be divided exactly by m, and each piecemeal i is calculated:
ξ i = 1 m Σ j ∈ B i Map j
13) by ξ iCalculate arbitrary piecemeal B i(the measurement number of times M in compressed sensing of 1≤i≤n/m) iFor:
M i = rnd ( θ max - ξ i 255 × ( θ max - θ min ) )
Wherein, θ MaxAnd θ MinThe maximal value and the minimum value of element in the matrix measured in expression respectively, and rnd () gets and the immediate integer of input variable;
Then, with the measured value M of all piecemeals i(1≤i≤n/m) be recorded in the measurement number of times vector M, i.e. M=(M 1, M 2..., M N/m);
14) image is carried out gray average, the steps include:
At first, the fixed size that former figure is divided into non-overlapping copies is that (dB≤B) supposes that m can be divided exactly each piecemeal B by t for the piecemeal of t=dB * dB i(1≤i≤n/m) be divided into m/t fritter again is designated as dB Ij(1≤i≤n/m, 1≤j≤m/t);
Then, calculate each piecemeal dB Ij(the gray average g of all pixels among the 1≤i≤n/m, 1≤j≤m/t) Ij(1≤i≤n/m, 1≤j≤m/t), and all gray values of pixel points in this piecemeal are set at this gray average;
At last, with piecemeal B i(each sub-piece dB among 1≤i≤n/m) Ij(gray average of 1≤j≤m/t) is stored in vectorial g i=(g I, 1g I, 2... g I, j... g I, m/t) in, 1≤i≤n/m;
15) choose random seed S, image X is carried out the piecemeal compressed sensing calculate, this piecemeal compressed sensing is calculated and is meant each sub-piece B i(1≤i≤n/m) carry out respectively calculating based on the compressed sensing of human visual system; Afterwards, again the compressed sensing result of calculation of each sub-piece is pressed its sequential combination in former figure X together, thereby obtain the compressed sensing measured value of image X;
Described piecemeal B i(compressed sensing based on human visual system of 1≤i≤n/m) is calculated, and the steps include:
At first, to B iCarry out wavelet transformation, obtain the sparse signal on the wavelet field
Figure BDA0000111498770000041
x B i = Ψ T B i
Wherein, is the wavelet transformation base;
Secondly, be M according to S generation scale iThe gaussian random of * m is measured matrix Φ i, wherein m is piecemeal B iPixel quantity, M iBe the piecemeal B that obtains in the step 13) iThe measurement number, the element in the said gaussian random matrix all produces at random, and its probability meets gaussian distribution nature;
At last, with sparse signal
Figure BDA0000111498770000044
Project in this measurement matrix, obtain Observed reading Y i, that is:
Y i = Φ i x B i = Φ i Ψ T B i
After all piecemeals have all carried out the compressed sensing measurement, with the compressed sensing result of calculation Y of each sub-piece iBy its sequential combination in former figure X together, the compressed sensing that has just obtained image X is measured Y;
In above-mentioned compressed sensing computation process, utilize less, the compressible characteristics of image nonzero element coefficient in wavelet transformed domain, each image block B based on human visual system iBe reduced to M from original m dimensional vector iDimensional vector has reduced the storage data volume effectively; Simultaneously, the measurement number of times M of different piecemeals iUtilize the remarkable characteristic of human vision to confirm; The vision signal portion can be given bigger measurement number of times, and the measurement number of times of the insensitive part of vision is then less, like this can the reasonable distribution computational resource; Both reduced the computing cost, for distorted image detects basis preferably was provided again;
16) use the LDPC lossy coding that the compressed sensing of image X is measured Y and encode, obtain the cryptographic hash Hash (X) of image X; Its process is specially, respectively to each piecemeal B iObserved reading Y iCarry out the LDPC lossy coding, obtain compressed code S iAfterwards, again with each S iConnect according to the order of sequence, the symbol string that obtains is as cryptographic hash Hash (X)=(S of image X 1S 2... S N/m), 1≤i≤n/m;
17) watermark of image X generates and credible transmission, and the watermark watermark (X) of said image X is exactly by Hash (X), random seed S and measures the tlv triple that the number of times vector M is formed, promptly
watermark(X)=(Hash(X),S,M)
Transmitting terminal is calculating watermark (X) afterwards, and the trusted channel through itself and receiving end sends watermark (X) to receiving end, through overt channel issue image X.
Described LDPC lossy coding is according to the distributed coding theory of lossy compression method signal to be carried out compressed encoding, is specially, for compressed signal W=(w 1w 2... w k), get its each element w i(the plurality of continuous position bit of 1≤i≤k), the initial bits position of establishing the bit of getting is p, stopping bit is q, and with the interposition Bit String according to each element w i(1≤i≤k) order in signal W connects successively, and the new Bit String that obtains is exactly the LDPC coding of signal W.
To twice minute block message: B, the dB of original image, and the initial bits position p of LDPC coding with stop bit q and can arrange in advance or send receiving end to through trusted channel.
Described step 2) receiving end image detection, the image watermark that the receiving end utilization is received by trusted channel, whether the image that checking is obtained by overt channel has passed through to distort and has been specially:
21) adopt the mode identical to receiving image X ' ∈ R with transmitting terminal N * NCarry out gray average, the steps include:
At first, the fixed size that X ' is divided into non-overlapping copies is the piecemeal B of m=B * B i', 1≤i≤n/m; And then with each B i' the size that is divided into non-overlapping copies is the piecemeal dB of t=dB * dB Ij', 1≤i≤n/m, 1≤j≤m/t;
Secondly, calculate each piecemeal dB Ij' in the gray average g of all pixels Ij', and all gray values of pixel points in this piecemeal are set at this gray average;
At last, with piecemeal B iIn each sub-piece dB IjGray average be stored in vectorial g i'=(g I, 1' g I, 2' ... g I, j' ... g I, m/t') in, 1≤i≤n/m, 1≤j≤m/t;
22) adopt the mode identical to receiving image X ' ∈ R with transmitting terminal N * NCarrying out the piecemeal compressed sensing calculates;
For piecemeal B i', 1≤i≤n/m at first carries out wavelet transformation, obtains the sparse signal on the wavelet field
Figure BDA0000111498770000051
x B i ′ = Ψ T B i
Wherein, is the wavelet transformation base;
Secondly, according to random seed S that is received by trusted channel and mapping graph M, the generation scale is M iThe gaussian random of * m is measured matrix Φ i
At last, with sparse signal
Figure BDA0000111498770000061
Project in this measurement matrix, obtain Observed reading Y i', that is:
Y i ′ = Φ i x B i ′ = Φ i Ψ T B i ′
After all piecemeals have all carried out the compressed sensing measurement, with the compressed sensing result of calculation Y of each sub-piece i' by its sequential combination in former figure X ' together, the compressed sensing that has just obtained image X ' is measured Y '=(Y 1' Y 2' ... Y N/m');
23) image cryptographic hash Hash (X)=(S to receiving 1S 2... S N/m), 1≤i≤n/m carries out the distributed decoding of the LDPC "=(Y that obtains Y 1" Y 2" ... Y N/m"), that is, initial bits position p when encoding according to LDPC and termination bit q are with S iAs Y i" in the bit value of p to the q position of each element; Y i" in all the other everybody by Y i' correspondence everybody fill up successively;
24) distorted image detects, and calculates Y " and the difference of Y ':
D=Y″-Y′
If D=0 explains that then the image of receiving end reception is consistent with the image that transmitting terminal is sent, do not distorted; If D ≠ 0, then presentation video was distorted, and carried out further tampering location, to point out in which position of image distorting.
Described step 3) receiving end tampering location is specially:
31) initializaing variable is set:
A) maximum iteration time Iter and acceptable error threshold e are set;
B) initialization Increment Matrix Aug_t is a null matrix, scale and the step 24 of matrix A ug_t) in the matrix of differences D that calculates identical;
C) residual values error initial value being set is error threshold e; Iterations time=0 is set;
D) temporary variable product being set is the matrix that has identical size with D;
32) with matrix product zero clearing, be changed to null matrix; Time=time+1;
33) recomputate the procuct matrix:
product i=abs(D igerror)
Product wherein iThe i row of expression product matrix, D iBe the i row of D, abs is an ABS function; Be each column vector of calculated difference matrix D and the inner product of residual values error, with its column vector as product matrix respective column;
34) confirm the maximal value val of each matrix element of product and the row pos at place thereof
35) expand Increment Matrix Aug_t, with product PosRow are added in the former Aug_t matrix as last row, obtain the Aug_t matrix after epicycle expands, that is: [Aug_t, product Pos] → Aug_t;
36) with the pos row zero setting of matrix of differences D;
37) calculate recovery matrix A ug_y:
Aug_y=(Aug_t′×Aug_t) -1×Aug_t′×e
Wherein, the transposed matrix of Aug_t ' expression Increment Matrix Aug_t; (Mat) -1The inverse matrix of representing matrix Mat;
38) each matrix element among the Aug_t connected line by line obtain the vectorial L.Aug_t of row, each matrix element among the Aug_y is connected line by line obtain the vectorial L.Aug_y of row equally, calculate the residual values error of epicycle iteration then:
error=e-L.Aug_t×L.Aug_y′
Wherein, L.Aug_y ' expression is by the column vector that obtains of the vectorial L.Aug_y transposition of row;
39) judge that whether error<e satisfies, if satisfy, then goes to step 310);
Otherwise, at first judge whether time=Iter, be then to go to step 310), otherwise return step 32) the continuation iterative computation;
310) algorithm finishes, and the recovery matrix A ug_y that obtains i.e. tampering location figure E for being recovered by D.
Compared with prior art, the present invention owing to selected resume speed compressed sensing restoration methods faster, and has been merged the human vision characteristics of cognition except on transinformation, reducing greatly, and its performance also is able to guarantee; Because the reliability of compressed sensing itself, a whole set of verification and measurement ratio that detects based on the distorted image of visual cognition compressed sensing also is able to ensure.
Description of drawings
Fig. 1 is the former figure of the employed Bird of embodiment;
The Bird synoptic diagram that Fig. 2 distorts for the employed process of embodiment;
Fig. 3 is the location map of the resulting tampered position of embodiment;
Fig. 4 is the location map of the tampered position implementing common compressed sensing and obtain.
Embodiment
Below in conjunction with accompanying drawing and specific embodiment the present invention is elaborated.
Embodiment
What this instance adopted is that size is 512 * 512 Bird gray scale picture, is designated as X ∈ R N * N, N=512 wherein.
The first step, the area-of-interest mapping graph of generation image.Specifically be that dct transform gene polyadenylation signal to image carries out standardization, with the marking area of further outstanding image.
At first, P=sign (C (X)) obtains significantly figure Map by following three steps.
F=abs(C -1(P))
Map = G * F 2 a 2 + b 2
Wherein C () and C -1() be the two-dimensional dct transform and the inverse transformation thereof of presentation video respectively, sign () is-symbol function, and abs () is the function that takes absolute value, G is two-dimentional gauss low frequency filter.Significantly the element among the figure Map is designated as Map i(1≤i≤n).
Then, we segment the image into the piecemeal that does not have overlapping fixed measure 2 * 2, use B iNote is made i piece piecemeal, wherein, and 0≤i<65536.We can handle each piecemeal as follows so:
ξ i = 1 m Σ j ∈ B i Map j
Wherein, m=4,0≤j<65536.
Note and since interest maps figure in the convolution process of the first step by standardization, so the brightness value of all pixels promptly satisfies 0≤ξ all in 0 to 255 scope i≤255.
Afterwards, calculate the measured value M of each piecemeal i i:
M i = rnd ( θ max - ξ i 255 × ( θ max - θ min ) )
Wherein, 0≤i<65536, θ MaxAnd θ MinRespectively expression the maximal value and the minimum value of receptible random measurement matrix measured value, be respectively 100 and 80 in this example.Function rnd is an immediate integer of getting input variable.
At last, with the measured value M of all piecemeals i(1≤i≤65536) are recorded in and measure in the number of times vector M, i.e. M=(M 1, M 2..., M 65536).
In second step, image is carried out gray average.
At first, the fixed size that former figure is divided into non-overlapping copies is dB IjPiecemeal, be 2 * 2 piecemeal in this instance.
Then, calculate each piecemeal dB IjIn the gray average g of all pixels Ij(1≤i≤65536 j=1), and are set at this gray average with all gray values of pixel points in this piecemeal.
At last, with the piecemeal B that obtains in the first step iEach sub-piece dB in (1≤i≤65536) Ij(1≤i≤65536, gray average j=1) is stored in vectorial g i=(g I, 1g I, 2... g I, j... g I, m/t) in, 1≤i≤65536.In the present embodiment, because piecemeal B iWith dB IjSize is identical, therefore vectorial g iOnly contain element, i.e. a g i=(g I, 1).
The 3rd step, choose random seed S, be used to generate the seed of random gaussian matrix.Image X is carried out the piecemeal compressed sensing to be calculated.In this patent, sparse base adopts the wavelet transformation base, and measuring matrix is that gaussian random is measured matrix.
To piecemeal B iThe compressed sensing based on human visual system of (1≤i≤65536) is calculated, and the steps include:
At first, to B iCarry out wavelet transformation, obtain the sparse signal on the wavelet field
Figure BDA0000111498770000091
x B i = Ψ T B i
Wherein,
Figure BDA0000111498770000093
is the wavelet transformation base
Secondly, be M according to S generation scale iThe gaussian random of * m is measured matrix Φ i, M iBe in the piecemeal B that obtains iThe measurement number.Element in the gaussian random matrix all produces at random, and its probability meets gaussian distribution nature.
At last, with sparse signal
Figure BDA0000111498770000094
Project in this measurement matrix, obtain
Figure BDA0000111498770000095
Observed reading Y i, that is:
Y i = Φ i x B i = Φ i Ψ T B i
After all piecemeals have all carried out the compressed sensing measurement, with the compressed sensing result of calculation Y of each sub-piece iBy its sequential combination in former figure X together, the compressed sensing that has just obtained image X is measured Y.
The 4th step, use the LDPC lossy coding that the compressed sensing of image X is measured Y and encode, obtain the cryptographic hash Hash (X) of image X.
Detailed process does, respectively to each piecemeal B iObserved reading Y iCarry out the LDPC lossy coding, promptly for compressed signal W=(w 1w 2... w k), get its each element w i(the 8th to the 18th bit in centre of 1≤i≤k), and with the interposition Bit String according to each element w i(1≤i≤k) order in signal W connects successively, and the new Bit String that obtains is exactly the LDPC coding of signal W.
To Y iCarry out obtaining compressed code S behind the LDPC lossy coding iAfterwards, again with each S iConnect according to the order of sequence, the symbol string that obtains is as cryptographic hash Hash (X)=(S of image X 1S 2... S N/m), 1≤i≤n/m.
Finally, with watermark (X)=(Hash (X), S M) is transferred to Verification System as watermark through trusted channel.
In addition, to twice minute block message: B=2, the dB=2 of original image, and the initial bits position 8 of LDPC coding with stop bit 18 agreement in advance, send receiving end to through trusted channel.
In the 5th step, receiving end adopts the mode identical with transmitting terminal to receiving image X ' ∈ R N * NCarry out gray average.This example uses Fig. 2 under attack through the Bird synoptic diagram simulation picture of distorting.
At first, the fixed size that X ' is divided into non-overlapping copies is the piecemeal B of m=2 * 2 i' (1≤i≤65536); And then with each B i' the size that is divided into non-overlapping copies is the piecemeal dB of t=2 * 2 Ij' (1≤i≤65536, j=1).
Secondly, calculate each piecemeal dB with the mode of transmitting terminal Ij' in the gray average g of all pixels Ij', and all gray values of pixel points in this piecemeal are set at this gray average.
At last, with piecemeal B iEach sub-piece dB in (1≤i≤65536) Ij(1≤i≤65536, gray average j=1) is stored in vectorial g i'=(g I, 1') in, 1≤i≤65536.
The 6th step is to image cryptographic hash Hash (X)=(S that receives 1S 2... S N/m), the distributed decoding of the LDPC "=(Y that obtains Y is carried out in 1≤i≤65536 1" Y 2" ... Y N/m"), that is, initial bits position 8 when encoding according to LDPC and termination bit 18 are with S iAs Y i" in the 8th to the 18th bit value; Y i" in all the other everybody by Y i' correspondence everybody fill up successively.
In the 7th step, distorted image detects.Calculate Y " and the difference of Y ':
D=Y″-Y′
If D=0 (representing null matrix here) explains that then the image of receiving end reception is consistent with the image that transmitting terminal is sent before, do not distorted; If D ≠ 0, then presentation video was distorted, and need further carry out tampering location, with which position of pointing out image was distorted.In this instance, the D non-zero, then presentation video is distorted, and needs further to use tampering location to come checking image by the part of malicious modification.
Described receiving end tampering location; Be meant after receiving end is judged received image and is maliciously tampered; Further utilize orthogonal matching pursuit (the Orthogonal Matching Pursuit of compressed sensing; OMP) signal reconfiguring method, D recovers with difference, thereby obtains tampered position image E.Concrete steps are following:
31) initializaing variable is set:
A) maximum iteration time Iter=128 and acceptable error threshold e=9 are set;
B) initialization Increment Matrix Aug_t is a null matrix, the scale of matrix A ug_t and 24) in the matrix of differences D that calculates identical;
C) residual values error initial value being set is error threshold e; Iterations time=0 is set;
D) temporary variable product being set is the matrix that has identical size with D;
32) with matrix product zero clearing, be changed to null matrix; Time=time+1;
33) recomputate procuct matrix: product i=abs (D iGerror)
Product wherein iThe i row of expression product matrix, D iBe the i row of D, abs is an ABS function;
Be each column vector of calculated difference matrix D and the inner product of residual values error, with its column vector as product matrix respective column.
34) confirm the maximal value val of each matrix element of product and the columns pos at place thereof.
35) expand Increment Matrix Aug_t, with product PosRow are added in the former Aug_t matrix as last row, obtain the Aug_t matrix after epicycle expands, that is: [Aug_t, product Pos] → Aug_t;
36) with the pos row zero setting of matrix of differences D;
37) calculate recovery matrix A ug_y:
Aug_y=(Aug_t′×Aug_t) -1×Aug_t′×e
Wherein, the transposed matrix of Aug_t ' expression Increment Matrix Aug_t; (Mat) -1The inverse matrix of representing matrix Mat.
38) each matrix element among the Aug_t connected line by line obtain the vectorial L.Aug_t of row, each matrix element among the Aug_y is connected line by line obtain the vectorial L.Aug_y of row equally, calculate the residual values error of epicycle iteration then:
error=e-L.Aug_t×L.Aug_y′
Wherein, L.Aug_y ' expression is by the column vector that obtains of the vectorial L.Aug_y transposition of row.
39) judge that whether error<e satisfies, if satisfy, then goes to 310);
Otherwise, at first judge whether time=Iter, be then to go to 310), otherwise return 32) the continuation iterative computation.
310) algorithm finishes, and the recovery matrix A ug_y that obtains i.e. tampering location figure E for being recovered by D.
Finally, the effect oriented of instance is as shown in Figure 3.Distort that to detect effect as shown in Figure 4 and document " Localization of sparse image tampering via random projections " adopts that common compression sensing method obtains.Can find out; The image recovery effects that adopts patent art to obtain is better than the result of conventional compression cognition technology; This mainly is that the measurement number of times of the insensitive part of vision is then less because present technique has been given more measurement number of times at the vision signal portion, like this can the reasonable distribution computational resource; Both reduced the computing cost, for distorted image detects basis preferably was provided again.

Claims (6)

1. the gray level image altering detecting method based on the human visual system compressed sensing is characterized in that, may further comprise the steps:
1) image watermark generates and transmission; Transmitting terminal is before images; At first utilize sparse basic conversion and the cryptographic hash of measuring this image of matrix generation, through safe lane transmission cryptographic hash, give receiving end then through the overt channel images based on the compressed sensing of human visual system;
2) receiving end image detection, the image watermark that the receiving end utilization is received by trusted channel, whether the image that checking is obtained by overt channel has passed through is distorted;
3) receiving end tampering location after receiving end is judged received image and is maliciously tampered, is further utilized the orthogonal matching pursuit reconstructing method of compressed sensing, and D recovers with difference, thereby obtains tampered position image E.
2. a kind of gray level image altering detecting method based on the human visual system compressed sensing according to claim 1 is characterized in that described step 1) is specific as follows:
11) generating the area-of-interest mapping graph of image, specifically is that the dct transform gene polyadenylation signal to image carries out standardization;
For a given gray-scale map X ∈ R N * N, wherein n=N * N is total pixel of image, it is significantly schemed Map and is produced by following process:
P=sign(C(X))
F=abs(C -1(P))
Map=G*F 2
Wherein C (X) and C -1(P) two-dimensional dct transform and the inverse transformation thereof of presentation video respectively, sign (C (X)) is-symbol function, abs (C -1(P)) be the function that takes absolute value, G is two-dimentional gauss low frequency filter, and the element of significantly scheming among the Map is designated as Map i(1≤i≤n);
12) image is carried out piecemeal and handle, at first, the fixed size that segments the image into non-overlapping copies is the piecemeal of m=B * B, and establishing i piecemeal is B i, wherein, 1≤i≤n/m supposes that n can be divided exactly by m, and each piecemeal i is calculated:
ξ i = 1 m Σ j ∈ B i Map j
13) by ξ iCalculate arbitrary piecemeal B i(the measurement number of times M in compressed sensing of 1≤i≤n/m) iFor:
M i = rnd ( θ max - ξ i 255 × ( θ max - θ min ) )
Wherein, θ MaxAnd θ MinThe maximal value and the minimum value of element in the matrix measured in expression respectively, and rnd () gets and the immediate integer of input variable;
Then, with the measured value M of all piecemeals i(1≤i≤n/m) be recorded in the measurement number of times vector M, i.e. M=(M 1, M 2..., M N/m);
14) image is carried out gray average, the steps include:
At first, the fixed size that former figure is divided into non-overlapping copies is that (dB≤B) supposes that m can be divided exactly each piecemeal B by t for the piecemeal of t=dB * dB i(1≤i≤n/m) be divided into m/t fritter again is designated as dB Ij(1≤i≤n/m, 1≤j≤m/t);
Then, calculate each piecemeal dB Ij(the gray average g of all pixels among the 1≤i≤n/m, 1≤j≤m/t) Ij(1≤i≤n/m, 1≤j≤m/t), and all gray values of pixel points in this piecemeal are set at this gray average;
At last, with piecemeal B i(each sub-piece dB among 1≤i≤n/m) Ij(gray average of 1≤j≤m/t) is stored in vectorial g i=(g I, 1g I, 2... g I, j... g I, m/t) in, 1≤i≤n/m;
15) choose random seed S, image X is carried out the piecemeal compressed sensing calculate, this piecemeal compressed sensing is calculated and is meant each sub-piece B i(1≤i≤n/m) carry out respectively calculating based on the compressed sensing of human visual system; Afterwards, again the compressed sensing result of calculation of each sub-piece is pressed its sequential combination in former figure X together, thereby obtain the compressed sensing measured value of image X;
Described piecemeal B i(compressed sensing based on human visual system of 1≤i≤n/m) is calculated, and the steps include:
At first, to B iCarry out wavelet transformation, obtain the sparse signal on the wavelet field
Figure FDA0000111498760000022
x B i = Ψ T B i
Wherein,
Figure FDA0000111498760000024
is the wavelet transformation base;
Secondly, be M according to S generation scale iThe gaussian random of * m is measured matrix Φ i, wherein m is piecemeal B iPixel quantity, M iBe the piecemeal B that obtains in the step 13) iThe measurement number, the element in the said gaussian random matrix all produces at random, and its probability meets gaussian distribution nature;
At last, with sparse signal Project in this measurement matrix, obtain
Figure FDA0000111498760000026
Observed reading Y i, that is:
Y i = Φ i x B i = Φ i Ψ T B i
After all piecemeals have all carried out the compressed sensing measurement, with the compressed sensing result of calculation Y of each sub-piece iBy its sequential combination in former figure X together, the compressed sensing that has just obtained image X is measured Y;
16) use the LDPC lossy coding that the compressed sensing of image X is measured Y and encode, obtain the cryptographic hash Hash (X) of image X; Its process is specially, respectively to each piecemeal B iObserved reading Y iCarry out the LDPC lossy coding, obtain compressed code S iAfterwards, again with each S iConnect according to the order of sequence, the symbol string that obtains is as cryptographic hash Hash (X)=(S of image X 1S 2... S N/m), 1≤i≤n/m;
17) watermark of image X generates and credible transmission, and the watermark watermark (X) of said image X is exactly by Hash (X), random seed S and measures the tlv triple that the number of times vector M is formed, promptly
watermark(X)=(Hash(X),S,M)
Transmitting terminal is calculating watermark (X) afterwards, and the trusted channel through itself and receiving end sends watermark (X) to receiving end, through overt channel issue image X.
3. a kind of gray level image altering detecting method according to claim 2 based on the human visual system compressed sensing; It is characterized in that; Described LDPC lossy coding is according to the distributed coding theory of lossy compression method signal to be carried out compressed encoding, is specially, for compressed signal W=(w 1w 2... w k), get its each element w i(the plurality of continuous position bit of 1≤i≤k), the initial bits position of establishing the bit of getting is p, stopping bit is q, and with the interposition Bit String according to each element w i(1≤i≤k) order in signal W connects successively, and the new Bit String that obtains is exactly the LDPC coding of signal W.
4. a kind of gray level image altering detecting method according to claim 2 based on the human visual system compressed sensing; It is characterized in that; To twice minute block message: B, the dB of original image, and the initial bits position p of LDPC coding with stop bit q and can arrange in advance or send receiving end to through trusted channel.
5. a kind of gray level image altering detecting method according to claim 4 based on the human visual system compressed sensing; It is characterized in that; Described step 2) receiving end image detection; The image watermark that the receiving end utilization is received by trusted channel, whether the image that checking is obtained by overt channel has passed through is distorted; Be specially:
21) adopt the mode identical to receiving image X ' ∈ R with transmitting terminal N * NCarry out gray average, the steps include:
At first, the fixed size that X ' is divided into non-overlapping copies is the piecemeal B of m=B * B i', 1≤i≤n/m; And then with each B i' the size that is divided into non-overlapping copies is the piecemeal dB of t=dB * dB Ij', 1≤i≤n/m, 1≤j≤m/t;
Secondly, calculate each piecemeal dB Ij' in the gray average g of all pixels Ij', and all gray values of pixel points in this piecemeal are set at this gray average;
At last, with piecemeal B iIn each sub-piece dB IjGray average be stored in vectorial g i'=(g I, 1' g I, 2' ... g I, j' ... g I, m/t') in, 1≤i≤n/m, 1≤j≤m/t;
22) adopt the mode identical to receiving image X ' ∈ R with transmitting terminal N * NCarrying out the piecemeal compressed sensing calculates;
For piecemeal B i', 1≤i≤n/m at first carries out wavelet transformation, obtains the sparse signal on the wavelet field
Figure FDA0000111498760000041
x B i ′ = Ψ T B i
Wherein,
Figure FDA0000111498760000043
is the wavelet transformation base;
Secondly, according to random seed S that is received by trusted channel and mapping graph M, the generation scale is M iThe gaussian random of * m is measured matrix Φ i
At last, with sparse signal
Figure FDA0000111498760000044
Project in this measurement matrix, obtain
Figure FDA0000111498760000045
Observed reading Y i', that is:
Y i ′ = Φ i x B i ′ = Φ i Ψ T B i ′
After all piecemeals have all carried out the compressed sensing measurement, with the compressed sensing result of calculation Y of each sub-piece i' by its sequential combination in former figure X ' together, the compressed sensing that has just obtained image X ' is measured Y '=(Y 1' Y 2' ... Y N/m');
23) image cryptographic hash Hash (X)=(S to receiving 1S 2... S N/m), 1≤i≤n/m carries out the distributed decoding of the LDPC "=(Y that obtains Y 1" Y 2" ... Y N/m"), that is, initial bits position p when encoding according to LDPC and termination bit q are with S iAs Y i" in the bit value of p to the q position of each element; Y i" in all the other everybody by Y i' correspondence everybody fill up successively;
24) distorted image detects, and calculates Y " and the difference of Y ':
D=Y″-Y′
If D=0 explains that then the image of receiving end reception is consistent with the image that transmitting terminal is sent, do not distorted; If D ≠ 0, then presentation video was distorted, and carried out further tampering location, to point out in which position of image distorting.
6. a kind of gray level image altering detecting method based on the human visual system compressed sensing according to claim 5 is characterized in that, described step 3) receiving end tampering location is specially:
31) initializaing variable is set:
A) maximum iteration time Iter and acceptable error threshold e are set;
B) initialization Increment Matrix Aug_t is a null matrix, scale and the step 24 of matrix A ug_t) in the matrix of differences D that calculates identical;
C) residual values error initial value being set is error threshold e; Iterations time=0 is set;
D) temporary variable product being set is the matrix that has identical size with D;
32) with matrix product zero clearing, be changed to null matrix; Time=time+1;
33) recomputate the procuct matrix:
product i=abs(D i?gerror)
Product wherein iThe i row of expression product matrix, D iBe the i row of D, abs is an ABS function; Be each column vector of calculated difference matrix D and the inner product of residual values error, with its column vector as product matrix respective column;
34) confirm the maximal value val of each matrix element of product and the row pos at place thereof;
35) expand Increment Matrix Aug_t, with product PosRow are added in the former Aug_t matrix as last row, obtain the Aug_t matrix after epicycle expands, that is: [Aug_t, product Pos] → Aug_t;
36) with the pos row zero setting of matrix of differences D;
37) calculate recovery matrix A ug_y:
Aug_y=(Aug_t′×Aug_t) -1×Aug_t′×e
Wherein, the transposed matrix of Aug_t ' expression Increment Matrix Aug_t; (Mat) -1The inverse matrix of representing matrix Mat;
38) each matrix element among the Aug_t connected line by line obtain the vectorial L.Aug_t of row, each matrix element among the Aug_y is connected line by line obtain the vectorial L.Aug_y of row equally, calculate the residual values error of epicycle iteration then:
error=e-L.Aug_t×L.Aug_y′
Wherein, L.Aug_y ' expression is by the column vector that obtains of the vectorial L.Aug_y transposition of row;
39) judge that whether error<e satisfies, if satisfy, then goes to step 310);
Otherwise, at first judge whether time=Iter, be then to go to step 310), otherwise return step 32) the continuation iterative computation;
310) algorithm finishes, and the recovery matrix A ug_y that obtains i.e. tampering location figure E for being recovered by D.
CN 201110376971 2011-11-23 2011-11-23 Human visual characteristic compressive sensing-based grayscale image tampering and detection method Active CN102509257B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110376971 CN102509257B (en) 2011-11-23 2011-11-23 Human visual characteristic compressive sensing-based grayscale image tampering and detection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110376971 CN102509257B (en) 2011-11-23 2011-11-23 Human visual characteristic compressive sensing-based grayscale image tampering and detection method

Publications (2)

Publication Number Publication Date
CN102509257A true CN102509257A (en) 2012-06-20
CN102509257B CN102509257B (en) 2013-07-10

Family

ID=46221335

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110376971 Active CN102509257B (en) 2011-11-23 2011-11-23 Human visual characteristic compressive sensing-based grayscale image tampering and detection method

Country Status (1)

Country Link
CN (1) CN102509257B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103347188A (en) * 2013-07-24 2013-10-09 南京邮电大学 Compressed sensing coding and decoding method for distributed video coding non-critical frame
CN106452456A (en) * 2016-09-29 2017-02-22 天津大学 Compressed sensing measurement matrix establishment method based on LDPC matrix
CN106650829A (en) * 2017-01-04 2017-05-10 华南理工大学 Picture similarity calculation method
CN108510464A (en) * 2018-01-30 2018-09-07 西安电子科技大学 Compressed sensing network and full figure reconstructing method based on piecemeal observation
CN112017093A (en) * 2019-12-16 2020-12-01 江苏水印科技有限公司 Image tamper-proofing detection algorithm based on DCT (discrete cosine transformation)
CN112099742A (en) * 2020-08-13 2020-12-18 深圳奇迹智慧网络有限公司 Asynchronous display control method, asynchronous display control terminal and asynchronous display system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1388813A2 (en) * 2002-08-09 2004-02-11 Matsushita Electric Industrial Co., Ltd. Apparatus and method for image watermarking
US20060104476A1 (en) * 2004-11-16 2006-05-18 Chao-Ho Chen Method for Authenticating the Compressed Image Data
CN102073980A (en) * 2011-01-06 2011-05-25 哈尔滨工程大学 Compression sensing theory-based interactive supported dual watermark generating and detecting method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1388813A2 (en) * 2002-08-09 2004-02-11 Matsushita Electric Industrial Co., Ltd. Apparatus and method for image watermarking
US20060104476A1 (en) * 2004-11-16 2006-05-18 Chao-Ho Chen Method for Authenticating the Compressed Image Data
CN102073980A (en) * 2011-01-06 2011-05-25 哈尔滨工程大学 Compression sensing theory-based interactive supported dual watermark generating and detecting method

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103347188A (en) * 2013-07-24 2013-10-09 南京邮电大学 Compressed sensing coding and decoding method for distributed video coding non-critical frame
CN103347188B (en) * 2013-07-24 2016-06-15 南京邮电大学 A kind of distributed video coding non-key frame compressed sensing decoding method
CN106452456A (en) * 2016-09-29 2017-02-22 天津大学 Compressed sensing measurement matrix establishment method based on LDPC matrix
CN106650829A (en) * 2017-01-04 2017-05-10 华南理工大学 Picture similarity calculation method
CN106650829B (en) * 2017-01-04 2019-07-16 华南理工大学 A kind of picture similarity calculating method
CN108510464A (en) * 2018-01-30 2018-09-07 西安电子科技大学 Compressed sensing network and full figure reconstructing method based on piecemeal observation
CN108510464B (en) * 2018-01-30 2021-11-30 西安电子科技大学 Compressed sensing network based on block observation and full-image reconstruction method
CN112017093A (en) * 2019-12-16 2020-12-01 江苏水印科技有限公司 Image tamper-proofing detection algorithm based on DCT (discrete cosine transformation)
CN112099742A (en) * 2020-08-13 2020-12-18 深圳奇迹智慧网络有限公司 Asynchronous display control method, asynchronous display control terminal and asynchronous display system

Also Published As

Publication number Publication date
CN102509257B (en) 2013-07-10

Similar Documents

Publication Publication Date Title
Ansari et al. SVD based fragile watermarking scheme for tamper localization and self-recovery
CN102509257B (en) Human visual characteristic compressive sensing-based grayscale image tampering and detection method
CN101847251B (en) Digital watermark embedding and extraction method based on chaos sequences
CN101866477B (en) Digital blind watermarking method for double protection of image integrity
CN102156955B (en) Robust reversible watermark embedding and extracting method based on histogram neighborhood
CN102156952B (en) Copyright-protection-service-oriented remote sensing image digital watermarking method
Azeroual et al. Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet
CN103996165A (en) Digital image zero watermark embedding and extracting method based on compressed sensing characteristics
CN104166955A (en) Conformal transformation-based image Hash generation method and image tampering detection and positioning method
CN103377457B (en) A kind of vector geographic data Hard Authentication vulnerable watermark method
CN102592256A (en) Digital image watermark detection method based on support vector machine correction
Xiao et al. A reversible image authentication scheme based on compressive sensing
Hemida et al. A restorable fragile watermarking scheme with superior localization for both natural and text images
Qiu et al. High-payload reversible watermarking scheme of vector maps
Zhu et al. Remote sensing image watermarking based on motion blur degeneration and restoration model
CN102117474B (en) Digital picture watermark embedding and detecting method and device
Li et al. Study on copyright authentication of GIS vector data based on Zero-watermarking
CN102646259A (en) Anti-attack robustness multiple zero watermark method
CN102419979A (en) Audio semi-fragile watermarking algorithm for realizing precise positioning of altered area
CN107358072B (en) Vector map digital fingerprint copyright protection method based on I code and CFF code
CN103903217A (en) Vector map integrity authentication method based on vertex insertion
Wang et al. Watermarking vector maps based on minimum encasing rectangle
Gangodagamage et al. Wavelet-compressed representation of landscapes for hydrologic and geomorphologic applications
Niu et al. GIS watermarking: hiding data in 2D vector maps
Nassar et al. Reliable mark-embedded algorithm for verifying archived/encrypted image contents in presence different attacks with FEC utilizing consideration

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant