CN103164831A - Image authentication and falsification locating method - Google Patents

Image authentication and falsification locating method Download PDF

Info

Publication number
CN103164831A
CN103164831A CN 201110409255 CN201110409255A CN103164831A CN 103164831 A CN103164831 A CN 103164831A CN 201110409255 CN201110409255 CN 201110409255 CN 201110409255 A CN201110409255 A CN 201110409255A CN 103164831 A CN103164831 A CN 103164831A
Authority
CN
China
Prior art keywords
image
authentication
information
falsification
embedding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 201110409255
Other languages
Chinese (zh)
Inventor
李立宗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University of Technology
Original Assignee
Tianjin University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University of Technology filed Critical Tianjin University of Technology
Priority to CN 201110409255 priority Critical patent/CN103164831A/en
Publication of CN103164831A publication Critical patent/CN103164831A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses an image authentication and falsification locating method and belongs to the technical fields of computer security, information hiding, image processing, electronic commerce, e-government affairs and the like. Based on a reversible information hiding algorithm, the image authentication and falsification locating method is improved and authentication of a digital image is achieved. The image authentication and falsification locating method is capable of effectively authenticating the digital image, and achieving falsification locating and the like. The image authentication and falsification locating method is characterized in that the image is segmented into blocks, information is embedded in each block, and therefore authentication information is guaranteed to be embedded in each fine image block. After any one of the image blocks is changed, changes can be reflected in a watermark, and therefore detail authentication of the image is achieved.

Description

Image authentication and tampering location method
Technical field
Under this patent, technical field is computer security, Information hiding, image processing, ecommerce, E-Government etc.
Background technology
For the convenience on narrating, take the gray level image Lena.bmp of 512 * 512 pixel sizes as example, will be described below based on histogrammic image reversible information hidden algorithm:
(1) analyze the original image histogram.Read in original image 1, and draw the histogram of this image, as shown in Figure 2.Pixel value corresponding to maximum of points is 156 in this histogram, illustrates that the pixel number of this pixel value in original image is maximum; Its left end value be 0 to 28 and its right-hand member value be that 245 to 255 pixel value is zero, the pixel that does not have these pixel values in original image is described.
(2) histogram is processed.Image is scanned, if its value of the pixel that scans is [29155], its value is deducted 1.After scanning was completed, no longer having pixel value in former figure was 155 pixel.
(3) embedding information.Again image is scanned, if its value of the pixel that scans is 156, can hide 1 information at this point.Hiding rule is, if point to be embedded is 0, this point remains unchanged; If point to be embedded is 1, this point value is subtracted 1.So far, Information hiding is completed.
(4) information extraction.The image of having hidden information is carried out sequential scanning, if the pixel point value that scans is 156, extract an information bit 0, if the pixel point value that scans is 155, extract an information bit 1, scanning process is completed and is namely completed the extraction that hides Info.
(5) recover original image.Scan image again, will the image interscan to the point of pixel point value between [28 155] add 1, namely complete the recovery of image.
Summary of the invention
Take the reversible information hidden algorithm as the basis, improve the authentication that realizes digital picture on the basis of reversible information hidden algorithm.Can carry out the validity authentication to digital picture, and realize tampering location etc.The focusing on of patent carried out piecemeal with image, realizes in each piece that then the embedding of information has guaranteed each tiny image block is embedded authentication information like this.After any one image block changes, can embody in watermark, thereby the details that reaches image authenticates.
Description of drawings
Fig. 1 is an example image of reading in.
Fig. 2 is the grey level histogram of Fig. 1.
Fig. 3 is the relation between each peak point figure place En that hides Info that can embed, the required left and right sides continuous zero point number summation Sn, required left side continuous zero point number Ln, required right side continuous zero point number Rn.
Embodiment
1 authentication information telescopiny capacity explanation
(1) read carrier image, draw out its histogram, find out the continuous zero point L in this histogrammic peak point Max and left side thereof i, i ∈ [0, Max], the continuous zero point R in right side i, j ∈ (Max, 255).
(2) for the transparency of image after the hiding capacity that improves information and embedding information, for peak point, mate embedding in the continuous zero point of histogram left and right sides selection, the relation between the figure place En that hides Info that each peak point can embed, the required left and right sides continuous zero point number summation Sn, required left side continuous zero point number Ln, required right side continuous zero point number Rn as shown in Figure 3.
When embedding information, if a zero point number average of the peak point left and right sides greater than
Figure BSA00000633424300021
That the left side is continuous
Figure BSA00000633424300022
Individual zero point is processed the position as embedding, and opposite side needs continuous zero point number to be processed to be
Figure BSA00000633424300023
If in a certain side of peak point both sides continuously zero point number Zn (Zn ≡ Ln or Zn ≡ Rn) less than
Figure BSA00000633424300024
The continuous zero point of this side is processed the position as embedding, the continuous zero point number that opposite side need to mate be Zn ' (Zn '=Sn-Zn).
When (3) hiding Info, the sequential scanning image if run into peak point Max, is chosen En bit from the information sequence after the process Chaotic Scrambling, if the En that chooses bit is 0, pixel value remains unchanged; Otherwise, calculate choose sequence and Sb, according to peak point both sides zero point number situation, Max and Sb are carried out arithmetical operation complete the information embedding.
Such as, a zero point number average of peak point both sides runs into peak point Max greater than 7 in scanning process, choose 4 bits from the sequence that will hide, if 4 bits choosing are 0, pixel value remains unchanged; Otherwise, calculate choose sequence and Sb, if mod (Sb, 2)=0, peak point deducts Sb/2, if mod (Sb, 2)=1 adds peak point
Figure BSA00000633424300025
In another kind of situation, if the zero point number of peak point side (taking in the left side as example) is less than 7, for example, Ln=3 runs into peak point Max in scanning process, choose 4 bits from the sequence that will hide, if 4 bits choosing are 0, pixel value remains unchanged; Otherwise, calculate choose sequence and Sb, if Sb≤3 peak point is deducted Sb, if Sb>3 add Sb with peak point.
According to all pixels in above-mentioned steps sequential scanning image, can complete embedding.In practical operation, can first choose corresponding 4 the embedding information of a peak point and complete embedding, the embedding capacity according to resulting PSNR value and actual needs after embedding is completed is further revised embedding figure place.
2 image authentications are realized brief introduction
Use the watermark embedded mode that this method embeds, the leaching process of watermark information is the inverse process of telescopiny.The problem that should be noted that is as follows:
(1) in information extraction process, should carry out information extraction by continuous zero point number Sn, left side continuous zero point number Ln, the right side continuous zero point number Rn of actual selection when embedding, adopt with the unmatched value of telescopiny and can't extract correct information.
(2) after completing information extraction, hiding Info of extracting is the information after the process Chaotic Scrambling, need to carry out inverted disorderly to information, corresponding chaos initial value during according to the chaos system of above-mentioned introduction and with encryption realizes that the inverted that hides Info disorderly extracts original hiding Info.
After completing the watermark information extraction, the watermark information and the original watermark information that extract can be carried out XOR, reach image authentication and tampering location by the authentication to watermark information.
3 authentication information telescopinies
3.1 image block
Original image is divided into the mutually disjoint image block of 8 * 8 sizes.Suppose that the image original size is N * N, original image is divided into (N/8) * (N/8) piece.
3.2 watermarking images pre-service
The embedding scheme can be selected independently embedding capacity of each image block, but calculated amount is too large like this, and needs to preserve too much authentication details information, is difficult to realize.This patent adopts the embedded mode of all image block equal capacity.
The watermark embedding capacity has vital impact to authentication.Because adopted the piecemeal embedded mode, therefore, except utmost point individual blocks, the most watermark information that can embed larger capacity is as authentication information.But the embed watermark information amount is too large on the one hand, easily cause image fault serious, on the other hand, there is the individual image piece, because the corresponding relation between 255 pixels of peak point and zero point, pixel position is less, to cause image can't complete completely reversibility in case embed too much information, authentication was lost efficacy, and therefore also just can't complete jumbo information and embed.
Before embedding, at first embedding capacity is assessed.Then original watermark image is divided into (N/8) * (N/8) piece.
3.3 watermarking images signature
In order to improve the reliability of authentication, the watermarking images of branch piece is carried out digital signature.In order to reach the purpose that each image block is authenticated, need to sign respectively to each image block.Implementation is:
signinfo i=sign privatekey(watermarkimage i)
In formula, signinfo is the authentication information of signature, and sign is the PKI function, is used for signature here, and privatekey is signer's private key, and watermarkimage is the watermarking images information that needs signature, and i is the sign of image block.
3.4 the embedding of authentication information
According to each image block in the method traversing graph picture of introducing in 1 trifle, set up between the watermarking images (authentication information) after (N/8) * (N/8) piece carrier image (need authentication image) and (N/8) * (N/8) piece signature and contact, the authentication information of correspondence is embedded in the initial carrier image, completes the embedding of authentication information.
This part may relate to the different corresponding relation of peak point and zero point and extreme point (pixel value is 255 pixel) in each image block.The parameter that need to remember in order to reduce operand and algorithm is analyzed the watermark authentication information capacity that each image block can embed, allow each image block unified embed identical figure place watermark information.
4 verification process
Verification process is the inverse process of telescopiny.
4.1 the image that will need to authenticate carries out piecemeal
The image of needs authentications identical mode when embedding is carried out piecemeal process, wait for next step operation.
4.2 authentication information extracts
This step need to be carried out identical operation, traversal for each piecemeal, completes the extraction of whole authenticating water-mark information, and the extraction details of each piece is as follows:
At first watermark information figure place En, the required left and right sides continuous zero point number summation Sn, left side continuous zero point number Ln, right side continuous zero point number Rn that the unit peak point of determining to choose when information embeds can embed.Then, the carrier image Odw ' that sequential scanning need to be verified if run into peak point Max, extracts En bit 0; If run into the peak point reference point, according to this occurrence, should value and Max carry out arithmetical operation and complete information extraction.
Such as, in leaching process, if run into pixel Max, extract 3 secret informations and be 0; Be [Max-Ln, Max+Rn] if run into the value of pixel, information extraction is Ln or Rn.The secret information that extracts is converted to 3 scale-of-two.For example, the information of extracting is 4, is converted into 3 binary ones 00.
According to all image blocks in above-mentioned steps sequential scanning image, can complete the extraction of authentication information, obtain authentication information Swrc.
4.3 the recovery of authentication information
The authentication information that extracts is decrypted, and when using with encryption, corresponding PKI is decrypted the authentication information that extracts.Be specially:
watermarkimageE i=sign publickey(S wrc(i))
In formula, watermakrimageE represents that the authentication information that extracts, sign are functions identical during with signature, and publickey is the PKI corresponding with privatekey, and Swrc is authentication information, and i means corresponding watermark information piece.
4.4 the authentication of image block
The watermarking images piece that extracts and original watermark image piece are carried out XOR to be compared.
tresult=Xor(watermarkimage i,watermarkE i)
Tresult is the XOR result of the watermarking images piece of correspondence, and Xor () represents XOR.Watermarkimage i, watermarkE iIt is respectively the watermark information image block of correspondence position.The result of radical tresult, whether distorting of judgement image block is specially:
Figure BSA00000633424300031
Reach authentication to each piece of initial carrier image according to the authentication result of watermarking images piece.

Claims (3)

1. image authentication and tampering location method, is characterized in that improving take the reversible information hidden algorithm as the basis authentication that realizes digital picture on the basis of reversible information hidden algorithm.Can carry out the validity authentication to digital picture, and realize tampering location etc.The focusing on of patent carried out piecemeal with image, realizes in each piece that then the embedding of information has guaranteed each tiny image block is embedded authentication information like this.After any one image block changes, can embody in watermark, thereby the details that reaches image authenticates;
2. method according to claim 1, is characterized in that take the reversible information hidden algorithm as the basis, on its basis zero point, the extreme point of peak point and its left and right sides set up and contacted, and reaches the purpose of the more authentication informations of embedding.
3. method according to claim 1, is characterized in that adopting PKI to complete authentication and the tampering location work of image.
CN 201110409255 2011-12-12 2011-12-12 Image authentication and falsification locating method Pending CN103164831A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110409255 CN103164831A (en) 2011-12-12 2011-12-12 Image authentication and falsification locating method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110409255 CN103164831A (en) 2011-12-12 2011-12-12 Image authentication and falsification locating method

Publications (1)

Publication Number Publication Date
CN103164831A true CN103164831A (en) 2013-06-19

Family

ID=48587891

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110409255 Pending CN103164831A (en) 2011-12-12 2011-12-12 Image authentication and falsification locating method

Country Status (1)

Country Link
CN (1) CN103164831A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105389771A (en) * 2015-12-21 2016-03-09 华北电力大学(保定) Location map adjusting method
CN105872305A (en) * 2016-04-13 2016-08-17 宁波工程学院 Full separable encryption domain image reversible data hiding method
CN108447492A (en) * 2018-03-13 2018-08-24 中山大学 A kind of self-adapting histogram translation reversible information hidden method based on segmentation
CN110390623A (en) * 2019-07-19 2019-10-29 成都信息工程大学 A kind of image media safety certification restoration methods based on secret sharing

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105389771A (en) * 2015-12-21 2016-03-09 华北电力大学(保定) Location map adjusting method
CN105872305A (en) * 2016-04-13 2016-08-17 宁波工程学院 Full separable encryption domain image reversible data hiding method
CN105872305B (en) * 2016-04-13 2018-06-05 宁波工程学院 A kind of completely separable encryption area image reversible data concealing method
CN108447492A (en) * 2018-03-13 2018-08-24 中山大学 A kind of self-adapting histogram translation reversible information hidden method based on segmentation
CN108447492B (en) * 2018-03-13 2021-08-20 中山大学 Self-adaptive histogram translation reversible information hiding method based on segmentation
CN110390623A (en) * 2019-07-19 2019-10-29 成都信息工程大学 A kind of image media safety certification restoration methods based on secret sharing
CN110390623B (en) * 2019-07-19 2023-03-24 成都信息工程大学 Secret sharing-based image media security authentication recovery method

Similar Documents

Publication Publication Date Title
Muhammad et al. A secure method for color image steganography using gray-level modification and multi-level encryption
Astuti et al. Simple and secure image steganography using LSB and triple XOR operation on MSB
CN109859093B (en) Mixed transform domain image zero-watermarking method based on variable parameter chaotic mapping
Aparna et al. Image watermarking using Diffie Hellman key exchange algorithm
Xiao et al. An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post-processing
Garg et al. A robust technique for biometric image authentication using invisible watermarking
CN103164831A (en) Image authentication and falsification locating method
CN110503592B (en) Two-dimensional code anti-counterfeiting method and system based on digital watermark
Komninos et al. Protecting biometric templates with image watermarking techniques
CN114782238A (en) Image self-authentication method based on hash function and information hiding
Wang et al. Content based authentication of visual cryptography
Lin et al. Applying projection and B-spline to image authentication and remedy
Surekha et al. A watermarking technique based on visual cryptography
Lou et al. Digital signature-based image authentication
Mathivadhani et al. Digital watermarking and information hiding using wavelets, SLSB and Visual cryptography method
Sumalatha et al. Local content based image authentication for tamper localization
Priya et al. Image watermarking techniques-a review
Al-Kadei et al. Improve a secure blind watermarking technique for digital video
Mursi et al. A DCT-based secure JPEG image authentication scheme
Abdelrahman Mohamed Mostafa Overview and Classification of Digital Watermarking Algorithms
Gupta et al. A survey on reversible watermarking techniques for image security
Liang et al. Ridgelet-based robust and perceptual watermarking for images
Mehan Semi-blind secure watermarking based on integration of AES and ECC in DCT domain
Kester et al. A Hybrid Cryptographic and Digital Watermarking Technique for Securing Digital Images based on a Generated Symmetric Key
Ghai et al. Protection against various attacks by using semi fragile technique

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130619