CN103984934A - Anti-occlusion face recognition method based on DFT robust watermarks under big data - Google Patents

Anti-occlusion face recognition method based on DFT robust watermarks under big data Download PDF

Info

Publication number
CN103984934A
CN103984934A CN201410229774.1A CN201410229774A CN103984934A CN 103984934 A CN103984934 A CN 103984934A CN 201410229774 A CN201410229774 A CN 201410229774A CN 103984934 A CN103984934 A CN 103984934A
Authority
CN
China
Prior art keywords
watermark
face
people
proper vector
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410229774.1A
Other languages
Chinese (zh)
Inventor
李京兵
李雨佳
杜文才
白勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hainan University
Original Assignee
Hainan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hainan University filed Critical Hainan University
Priority to CN201410229774.1A priority Critical patent/CN103984934A/en
Publication of CN103984934A publication Critical patent/CN103984934A/en
Pending legal-status Critical Current

Links

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses an anti-occlusion face recognition method based on DFT robust watermarks under big data. The anti-occlusion face recognition method mainly includes a watermark embedding process and a watermark extraction process, and face recognition is realized in the watermark extraction process. The anti-occlusion face recognition method mainly comprises the following steps that in the watermark embedding process, firstly, global DFT is conducted on all original faces so that feature vectors can be worked out in real part coefficients, and secondly, the watermark of each face is associated with the feature vector of the corresponding face through a hash function in cryptology; in the watermark extraction process, thirdly, the feature vector of the face to be tested is obtained, the correlation coefficient maximum value of the feature vector of the face to be tested and the original face feature vector is worked out, face recognition is completed according to a serial number corresponding to the correlation coefficient maximum value, and the corresponding embedded watermark is obtained, and fourthly, the feature vector of the face to be tested is used for watermark extraction, and the correlation coefficient of the watermark is calculated. The anti-occlusion face recognition method has the advantages of being applicable to the big data because sampling training is not needed, and has high resistance to occlusion, light and other attacks.

Description

The anti-attack face identification method that blocks based on DFT robust watermarking under large data
Technical field
The present invention relates to a kind of field of multimedia signal processing, be specifically related to the anti-attack face identification method that blocks based on transform domain robust watermarking under large data.
Technical background
Face recognition technology, as a kind of effective biometrics identification technology, obtains the attention of industry member and academia day by day over nearly 40 years.Because face recognition technology has height, can accept, naturality, be difficult for by advantages such as people discover, so it has larger purposes at aspects such as amusement, crime survey, gate control system, military affairs.
The method of recognition of face is at present mainly based on machine learning methods such as PCA, neural network, SVM, owing to will carrying out training study, sample for identification is larger, under large data environment, the time of study is longer, and current face identification method is for blocking variation, and expression shape change or illumination etc. are more responsive, therefore how to solve under large data environment, resist the face identification method of attacks such as blocking variation, expression shape change or illumination significant.
Digital watermark technology is the copyright protection for the Digital Media on internet at first, and its key property is robustness and invisibility; The present invention can be hidden in people's signature or ID etc. in its corresponding facial image as watermark, utilizes the robust property of watermark to realize face recognition algorithms, especially to blocking, the attack such as illumination has good robustness.At present for based under large data environment, the Face Recognition of anti-ly block, illumination being attacked less, does not also see disclosed report at present.Therefore the robust watermarking technology of research based on DFT realizes the anti-face identification method that blocks attack under large data, has larger meaning.
Summary of the invention
Goal of the invention: technical matters to be solved by this invention is for the deficiencies in the prior art, provides at a high speed, the face recognition algorithms of high robust.Specifically disclosing the anti-attack face identification method that blocks based on DFT robust watermarking under a kind of large data, is a kind of zero watermarking project, and the embedding of watermark does not affect original facial image.
Ultimate principle of the present invention is: first all people's face image is carried out to overall DFT conversion; Choose the real part of front 8x8 coefficient of low frequency part, then in the real part of this coefficient, find an anti-proper vector of blocking attack, and watermark sequence is associated and realizes the embedding of watermark with this proper vector; Then for testing image, first calculate its proper vector, then calculate the related coefficient of the proper vector of testing image and original image, utilize related coefficient maximal value, realize the detection of people's face; And realized the extraction of watermark.
Now to method of the present invention, be elaborated as follows:
First select a significant binary sequence will embed in facial image as watermark, be designated as W={w (j) | w (j)=0,1; 1≤i≤L}; Meanwhile, choosing and establishing F is original facial image, represents: F={f (i, j) | f (i, j) ∈ R; 1≤i≤M1,1≤j≤N1}.Wherein, f (i, j) represents the pixel value of primitive man's face.
First: the embedding of watermark
1), by all original facial image F (n) are carried out to overall DFT conversion, obtain the proper vector set V (n) of original image;
First successively original facial image F (n) is carried out to overall DFT conversion, in the low frequency coefficient matrix F F (i, j) of frequency field, choose the real part coefficient FF in front 8 * 8 coefficients 8(i, j), and then to the real part matrix of coefficients FF selecting 8(i, j) carries out binary conversion treatment, when coefficient is more than or equal to zero, gets 1, and being less than 0 is to get zero, obtains proper vector V, and main process is described below:
FF(i,j)=DFT2(F(i,j))
FF 8(i,j)=REAL(FF(i,j))
V(n)=BINARY(FF 8(i,j))
2) utilize cryptography HASH function, generate two-value key sequence Key (n) with watermarked information, realize the embedding of zero watermark;
Key(n)=V(n)⊕W(n)
Key (n) is that the Hash function conventional by cryptography generates by the proper vector V (n) of all original images and corresponding n digital watermarking W (n); Here the random series that W (n) is 64bit by length forms; Preserve Key (n), while extracting watermark below, will use; By Key (n) is applied for to third party as key, to obtain the right to use and the entitlement of facial image;
Second portion: the identification of people's face and the extraction of watermark
3) obtain the proper vector V' of people's face F' to be measured;
If people's face to be measured is F', the real part matrix of coefficients that obtains low frequency coefficient after the two-dimentional DFT conversion of the overall situation is FF ' (i, j), by step 1) low frequency real part matrix of coefficients is carried out to binary conversion treatment, obtain the proper vector V' of people's face to be measured;
FF'(i,j)=DFT2(F'(i,j))
FF 8'(i,j)=REAL(FF'(i,j))
V'=BINARY(FF 8'(i,j))
4) calculate the related coefficient NC (n) of the proper vector V' of people's face to be measured and the V (n) of primitive man's face, carry out the identification of people's face;
Calculate the corresponding n value of related coefficient maximal value of V' and V (n), establish n=k; According to k value, can obtain key K ey (k), identify original facial image is F (k) and the watermark value W (k) that is embedded in F (k), and the normalized correlation coefficient formula between calculated characteristics vector is as follows:
NC Σ i V ( i ) V ′ ( i ) Σ i V 2 ( i )
5) utilize the proper vector V ' that is present in third-party two-valued function key sequence Key (k) and people's face to be measured, extract the watermark W' in testing image;
W'=Key(k)⊕V'
6) calculate the related coefficient between W' and W (k); Calculate the related coefficient NC of the watermark of extraction and the watermark of embedding, and can differentiate according to watermark the content of testing image.
The present invention and existing face recognition technology relatively have following advantage:
First: preferably the identification of the robustness of watermark and invisibility and people's face has been carried out to organic combination; Utilize the Robust Algorithms of watermark, realized people's face algorithm anti-ly block, the attack such as illumination, face's distortion, and the embedding of watermark does not affect the pixel value of original image; Secondly: watermark can also be protected individual privacy, only has the user of mandate just can carry out the identification of people's face; Finally, and due to this face recognition technology, do not need the study of sample, so be suitable for a large amount of recognitions of face, be suitable for the identification of large data human face.
Below from theoretical foundation and experimental data explanation:
1) discrete Fourier transformation
Two-dimensional discrete Fourier direct transform (DFT) formula is as follows:
F = ( u , v ) = Σ x = 0 M - 1 Σ y = 0 N - 1 ( x , y ) · e - j 2 πxu / M e - j 2 πyv / N
u=0,1,…,M-1;v=0,1,…,N-1;
Two-dimensional discrete Fourier inversion (IDFT) formula is as follows:
f ( x , y ) = 1 MN Σ u = 0 M - 1 Σ v = 0 N - 1 F ( u , v ) e j 2 π ( ux M + vy N )
x=0,1,…,M-1;y=0,1,…,N-1
X wherein, y is spatial domain sampled value; U, v is frequency field sampled value, digital picture represents by pixel square formation conventionally, i.e. M=N.
From formula above, the coefficient symbols of DFT is relevant with the phase place of component.
2) choosing method of the visual feature vector of facial image robust
Current most of face recognition algorithms is that attack to implement be that under spatial domain, larger variation has occurred pixel value, particularly the impact of indoor and outdoor illumination when these to shade, illumination, the poor reason of expression shape change anti-attack ability; Can the proper vector that find an anti-illumination, shade etc. to attack significant.If can find the proper vector of a reflection facial image geometrical feature, when there is little geometric transformation and illumination variation in facial image, can there is not obvious sudden change in this proper vector, so according to this proper vector, utilize the maximal value of related coefficient, we try to achieve corresponding original image, and extract corresponding watermark.
For this reason, choose some and block attack, the experimental data of the conventional attacks such as illumination attack and filtering is shown in Table 1.The original image that is used as test in table 1 is Fig. 1, is the first width people face of ORL face database, by the AT & T of Cambridge University establishment of laboratory; What in table 1, " the 1st row " showed is the attack type that face recognition algorithms is subject to, and this facial image after the illumination that is subject to varying strength is attacked is shown in Fig. 2 to Fig. 4, and intensity of illumination is ascending; Block to attack and see Fig. 5 to Fig. 7; Comprise, study that common glasses block, mouth mask blocks blocks with cap; Fig. 8 is that extruding is attacked, and Fig. 9 is that sphere is attacked, and such attack is similar to expression shape change and attacks; The conventional attacks such as Gaussian noise, JPEG compression, medium filtering are shown in Figure 10 to Figure 12." the 2nd row " of table 1 represents is the Y-PSNR (PSNR) of facial image after under attack; " the 10th row " arrive in " the 3rd row " of table 1, are the low frequency real part coefficients after DFT converts, choose here " D (1,1), D (1,2) ... D (1,8) " etc. eight low frequency variations territory real part coefficients." the 11st row " of table 1 are the symbol sebolic addressings for feature extraction.We find data by this table, and for attacks such as illumination, shade bird cagings, the low frequency value D of these dct transform domains (1,1), may there are some conversion in D (1,8) etc., but its coefficient symbols is still constant, we,, by the coefficient that is more than or equal to 0, are designated as 1; Be less than 0 be designated as 0, so for primitive man's face data, coefficient value D (1,1), D (1,2) ... the symbol binary sequence of the correspondences such as D (1,8) is: " 11000011 ", the 11st row in Table 1, observing these row can find, no matter illumination is attacked, and shade is attacked, distortion attack or conventional attack, the maintenance of its symbol sebolic addressing and raw data is similar, and all larger with the symbol sebolic addressing normalized correlation coefficient of raw data, in Table the 12nd row.The related coefficient that result shows is all greater than 0.5, and this is the facies relationship numerical value that 64 bit sign sequences are tried to achieve before low frequency real part coefficient is got.
Table 1 facial image DFT real part coefficient and part real part coefficient are subject to the changing value after different attack
In order to further illustrate the proper vector that symbol sebolic addressing is facial image, we obtain its visual feature vector by different facial images, then calculate the related coefficient between them; Here getting people's face of front 10 normal expressions of ORL face database tests; Figure 13-Figure 22, from angle of statistics, has got front 8 * 8 64 DFT real part coefficients altogether of DFT territory low frequency part here.And obtain the related coefficient between each proper vector, result of calculation is as shown in table 2.
As can be seen from Table 2, first, the related coefficient between facial image self is maximum, is 1.00; Secondly, the related coefficient of the characteristics of image of different people face is all not more than 0.5; This with our human eye actual observation to be consistent, the proper vector that this explanation is extracted by the method for this invention, reflected main resemblance and the main profile of people's face, and people's face profile is more similar, the similarity degree of proper vector is higher.
Related coefficient (vector length 64bit) between a table 2.10 different people face image feature vector
3) relation of the robustness of the length of proper vector and people's face algorithm
According to human visual system (HVS), Low Medium Frequency signal is larger to people's visual impact, for two dimensional image, is image outline.Therefore, we choose the Low Medium Frequency coefficient of facial image when facial image is chosen to proper transformation coefficient, the number of Low Medium Frequency coefficient is selected and the original facial image size of carrying out overall DFT conversion, and the quantity of information of the watermark of disposable embedding and require relevant, the length L of the proper vector of choosing is less, the quantity of information of disposable embedding is fewer, but the robustness of watermark is higher.Consider experiment below, the length that we choose L when specific experiment is 64.
Fig. 1 is original facial image.
Fig. 2 is the facial image after illumination is attacked, and intensity of illumination is S.
Fig. 3 is the facial image after illumination is attacked, and intensity of illumination is M.
Fig. 4 is the facial image after illumination is attacked, and intensity of illumination is L.
Fig. 5 is the facial image blocking through glasses.
Fig. 6 is the facial image blocking through mouth mask.
Fig. 7 is the facial image blocking through cap.
Fig. 8 is the facial image after extruding distortion is attacked, and distortion quantity is-40%.
Fig. 9 is the facial image after sphere distortion is attacked, and distortion quantity is 20%.
Figure 10 is the facial image disturbing through Gauss, and gaussian intensity is 5%.
Figure 11 is that compression quality is 5% through the facial image of JPEG compression.
Figure 12 is the facial image through medium filtering, and filtering parameter is [3x3], and filter times is 10.
The facial image of the 1st people in Figure 13 ORL face database.
The facial image of the 2nd people in Figure 14 ORL face database.
The facial image of the 3rd people in Figure 15 ORL face database.
The facial image of the 4th people in Figure 16 ORL face database.
The facial image of the 5th people in Figure 17 ORL face database.
The facial image of the 6th people in Figure 18 ORL face database.
The facial image of the 7th people in Figure 19 ORL face database.
The facial image of the 8th people in Figure 20 ORL face database.
The facial image of the 9th people in Figure 21 ORL face database.
The facial image of the 10th people in Figure 22 ORL face database.
The facial image that Figure 23 is to be measured, noiseless attack.
Figure 24 when attacking, the original image detecting.
Figure 25 when attacking, the watermark extracting.
Figure 26 is that intensity of illumination is-100% facial image.
When Figure 27 intensity of illumination is-100%, the original facial image detecting.Figure 28 intensity of illumination is-100% watermark extracting.
The facial image that Figure 29 glasses block, blocks size for M.
When Figure 30 glasses block, the facial image detecting.
When Figure 31 glasses block, the watermark of extraction.
The facial image that Figure 32 mouth mask blocks, blocks size for M.
Figure 33 mouth mask blocks and is, the facial image detecting.
When Figure 34 mouth mask blocks, the digital watermarking of extraction.
The facial image that Figure 35 cap blocks, blocks size for M.
When Figure 36 cap blocks, the facial image detecting.
When Figure 37 cap blocks, the digital watermarking of extraction.
The facial image of Figure 38 face extruding, crushing strength is-40%.
Figure 39 when crushing strength is-40%, the facial image of identification.
Figure 40 when crushing strength is-40%, the digital watermarking extracting.
The facial image of Figure 41 sphere distortion, distortion quantity is 20%.
Figure 42 when sphere distortion quantity is 20%, the facial image detecting.
Figure 43 when sphere distortion quantity is 20%, the watermark of extraction.
The facial image that Figure 44 Gaussian noise is attacked, Gaussian noise intensity is 5%.
Figure 45 is 5% in Gaussian noise intensity, the facial image recognizing.
Figure 46 is in Gaussian noise intensity 5%, the watermark of extraction.
The facial image of Figure 47 JPEG compression, compression quality is 5%.
Figure 48 at JPEG boil down to 5% is, the original image of identification.
Figure 49 when JPEG boil down to 5%, the watermark information of extraction.
The facial image of Figure 50 medium filtering, filtering parameter is: [3x3], filter times is 10.
Figure 51 is [3x3] at medium filtering, the original image detecting.
Figure 52 is in medium filtering parameter [3x3], the watermark of extraction.
Embodiment
Below in conjunction with accompanying drawing, the invention will be further described, emulation platform is Matlab2010a, produces 1000 groups of independently binary pseudo-random (value+1 or 0), and every group of sequence length is 64bit, corresponding 1000 digital watermarkings of these 1000 groups of data, W (n).Each watermark correspondence an original image, establishes the piece image of the corresponding ORL of the 500th group of watermark here, sees Fig. 1, and its size be 92x112, and this figure is in this as original image be subject to the test pattern of zero attack.
Convenient in order to test the experiment that anti-illumination, shade attacks, the other 1000 groups of two-value random seriess of regeneration (value is+1, or 0), every group of sequence length is 64bit, these 1000 groups of proper vectors as 1000 original images, V (n); The 500th unit deposited to the original feature vector of the first width people face figure in ORL face database;
Its basic ideas are that first giving one does not have testing image F ' under attack to see Figure 23, obtains its proper vector V', then, by asking the related coefficient of the V (n) of V' and all original images, obtains its maximal value; Then determine corresponding sequence number k, make when n=k, the related coefficient of V' and V (k) is maximum, according to sequence number k value, try to achieve the original image F (k) of identification, with watermark W (k) and the key K ey (k) of the embedding of corresponding original image F (k), wherein Key (k)=W (k) ⊕+V (k); According to V' and Key (k), obtain the watermark information W ' in testing image F', W'=V' ⊕+Key (k), and obtain the related coefficient of W (k) and W ', according to NC, be worth size to determine the degree of correlation of watermark and the owner of testing image.
Figure 23 is the facial image to be measured not adding while disturbing;
Figure 24 is the original facial image detecting;
Figure 25 is the watermark of extracting, and can see NC=1.00, can accurately extract watermark.
Below we are judged the anti-illumination of this face recognition algorithms based on robust watermarking, are blocked and the abilities such as conventional attack by specific experiment.
First test the anti-illumination of this face recognition algorithms, block with distortion and attack.
(1) experiment is attacked in illumination
Table 3 is experimental datas that anti-illumination is attacked.Therefrom can see, when testing image reduces intensity of illumination, when intensity of illumination is-100%, the signal to noise ratio (S/N ratio) of testing image is 7.21dB, by asking the related coefficient maximal value of proper vector, corresponding original image correctly detected, and can accurately extract digital watermarking, related coefficient NC=0.72; And adopt google to scheme to search figure function, work as testing image, when intensity of illumination is-100%, cannot search correct original image.As can be seen from Table 3, when intensity of illumination is 100%, at this moment the signal to noise ratio (S/N ratio) of testing image is 9.34dB, correct original image still can be detected and extract watermark, and watermark related coefficient is 0.94; Illustrate that this face recognition algorithms based on watermark has good anti-illumination attacking ability.
Figure 26 is that intensity of illumination is-80% testing image; Dark images visually, signal to noise ratio (S/N ratio) PSNR is 8.43dB;
Figure 27 is the facial image recognizing, and the proper vector related coefficient of the proper vector of this figure and testing image is maximal value;
Figure 28 is the watermark of extracting, and NC=0.85, is easy to extract watermark.
Experimental data is attacked in the anti-illumination of table 3
(2) block and attack experiment
Blocking is in face recognition process, and insoluble problem, but recognition of face based on robust watermarking are utilized the robustness of watermarking algorithm, preferably resolve this problem.Table 4 is anti-experimental datas of blocking attack.Comprise that glasses block, mouth mask blocks with cap and blocks; In table, S, M, L represents respectively the relative size of the area that blocks; From table 4, can see, when glasses block when more, block size for L, the PSNR=14.73dB of shielded image, signal to noise ratio (S/N ratio) is lower, but still can correctly identify original image, and extracts watermark, NC=0.56; When mouth mask blocks morely, block size when the L, the PSNR=17.09dB of shielded image, still can extract watermark, NC=0.56; When cap blocks, shielded area is larger, and during for L, at this moment signal to noise ratio (S/N ratio) is PSNR=12.20dB, still can extract watermark, NC=0.54
Figure 29 is that glasses block, and blocking size is the testing image of M; At this moment have certain occlusion effect, signal to noise ratio (S/N ratio) PSNR is 16.28dB;
Figure 30 is the original facial image detecting; Can correctly identify corresponding original image;
Figure 31 is the watermark of extracting, NC=0.69, can be correct extract watermark.
Figure 32 is that mouth mask blocks, and blocks size for M, and at this moment occlusion effect is obvious, and signal to noise ratio (S/N ratio) is lower, and PSNR is 17.39dB;
Figure 33 is the original image of identification, can find out and can correctly identify original image;
Figure 34 is the watermark of extracting, and NC=0.57, can correctly extract the watermark of testing image.
Figure 35 is that cap blocks, and blocking size is the testing image of M; At this moment occlusion effect is obvious, and signal to noise ratio (S/N ratio) PSNR is 13.10dB;
Figure 36 is the facial image of identification; Can correctly identify corresponding original image;
Figure 37 is the watermark of extracting, and NC=0.65, is easy to detect watermark.
Table 4 is anti-blocks attack
(3) experiment is attacked in face's extruding
The experimental data that the extruding of table 5 Shi Kang face is attacked, the variation of expression sometimes can be reflected in facial extruding.Therefrom can see, when testing image face extruding degree is larger, when extruding quantity is 40%, at this moment the signal to noise ratio (S/N ratio) of image is lower is 19.03dB, but still original image can be detected and extract watermark, NC=0.56;
Figure 38 is that crushing strength is-40% testing image; Facial expression changes more obvious, and signal to noise ratio (S/N ratio) is 20.01dB;
Figure 39 is the facial image recognizing, and can correctly recognize facial image;
Figure 40 is the watermark of extracting, and NC=0.81, is easy to detect watermark.
The extruding of table 5 face is attacked
(4) sphere distortion is attacked
Table 6 is experimental datas that the sphere distortion of the anti-face of watermarking algorithm is attacked.From table, can see, when the distortion of testing image sphere is larger, when distortion quantity is 40%, at this moment the signal to noise ratio (S/N ratio) of testing image is lower is 18.68dB, but still original image can be detected, and can extract watermark, NC=0.50;
Figure 41 is that sphere distortion is attacked, the testing image that distortion quantity is 20%; The distortion of face is more obvious, and signal to noise ratio (S/N ratio) is 20.45dB;
Figure 42 is the facial image recognizing, and primitive man's face can be detected;
Figure 43 is the watermark of extracting, and NC=0.81, can correctly extract watermark.
The distortion of table 6 sphere is attacked
Above-mentioned mainly to illumination, the attack such as block and test, below the conventional attacks such as filtering are tested;
(1) attacked by noise experiment
Use imnoise () function in testing image, to add Gaussian noise.
Table 7 is experimental datas of anti-Gauusian noise jammer.Therefrom can see, when testing image Gaussian noise intensity is up to 30% time, the PSNR of testing image is down to 7.94dB, and at this moment testing image is second-rate; Still original image can be correctly detected, watermark can be extracted, NC=0.65.And use google to scheme to search figure function, when the Gaussian noise intensity of testing image is only 5%, just cannot carry out the identification of normal original image.The anti-Gaussian noise ability that this explanation adopts this invention to have.
Figure 44 is the testing image of Gaussian noise intensity 5%, visually very fuzzy, PSNR=13.07dB;
Figure 45 is the people's face original image recognizing, and can correctly identify;
Figure 46 is the watermark of extracting, and can accurately must extract watermark, NC=0.91.
Table 7 is anti-Gauss disturb
Noise intensity (%) 1 2 3 5 10 20 30
PSNR 19.39 16.42 14.94 13.07 10.57 8.80 7.94
NC 0.97 0.92 0.91 0.91 0.85 0.77 0.65
(2) JPEG compression attack experiment
Adopt image compression quality percentage, as parameter, testing image is carried out to certificate and carry out JPEG compression; Table 8 is testing image JPEG compression experiment data.When compression quality is only 2%, at this moment compression quality is lower, and PSNR=22.21dB still can extract watermark, NC=0.68.
Figure 47 is that compression quality is 5% testing image, and blocking artifact has appearred in this figure,
PSNR=25.12dB;
Figure 48 is the original image of identification, can correctly identify;
Figure 49 is the watermark of extracting in testing image, and NC=0.82 can accurately extract watermark.
Table 8 JPEG attacks experiment
Compression quality 2 5 10 20 30 40
PSNR 22.21 25.12 27.7 29.86 31.15 32.08
NC 0.68 0.82 0.87 1.00 0.97 1.0
(3) medium filtering is attacked experiment
Table 9 is that anti-medium filtering is attacked experiment, and it can be seen from the table, when medium filtering parameter is [7x7], filtering multiplicity is 10 o'clock, the lower PSNR=20.92dB of signal to noise ratio (S/N ratio) of image, but still can record the existence of watermark, NC=0.66.
Figure 50 is that medium filtering parameter is [3x3], the testing image that filtering multiplicity is 10, and it is fuzzy that image has occurred, PSNR=29.18dB;
Figure 51 is the in the situation that of above-mentioned filtering, and the original image detecting at this moment can be correct
Original image detected;
Figure 52 is the watermark of extracting in testing image, and NC=0.90 can accurately extract watermark.Table 9 medium filtering is attacked experiment.

Claims (1)

1. the anti-attack face identification method that blocks based on DFT robust watermarking under large data, it is characterized in that: first primitive man's face is carried out to overall DFT conversion, before domain of variation is chosen, 8x8 real part coefficient, as proper vector, is then associated watermark information and proper vector, realizes the embedding of watermark; Then for people's face to be measured, obtain its proper vector, then calculate the related coefficient of people's face to be measured and everyone face proper vector, obtain related coefficient maximal value, according to this value, obtain the facial image of identification, the watermark of embedding; Then according to the proper vector of testing image, extract watermark, obtain watermark related coefficient; Realize the embedding of digital watermarking and the identification of extraction and people's face; This invention comprises that watermark embeds and extract two large divisions, amounts to six steps:
First: the embedding of watermark
1), by all original facial image F (n) are carried out to overall DFT conversion, obtain the proper vector set V (n) of original image;
First original facial image F (n) is carried out to overall DFT conversion, in the real part matrix of coefficients FF (i, j) of the low frequency coefficient of frequency field, choose front 8 * 8 coefficient FF 8(i, j), and then to the matrix of coefficients FF selecting 8(i, j) carries out binary conversion treatment, when coefficient is more than or equal to zero, gets 1, and being less than 0 is to get zero, obtains proper vector V, and main process is described below:
FF(i,j)=DFT2(F(i,j))
FF 8(i,j)=REAL(FF(i,j))
V(n)=BINARY(FF 8(i,j))
2) utilize cryptography HASH function, generate two-value key sequence Key (n) with watermarked information, complete the embedding of zero watermark;
Key(n)=V(n)⊕W(n)
Key (n) is that the Hash function conventional by cryptography generates by the proper vector V (n) of all original images and corresponding n digital watermarking W (n); Here the random series that W (n) is 64bit by length forms; Preserve Key (n), while extracting watermark below, will use; By Key (n) is applied for to third party as key, to obtain the right to use and the entitlement of facial image;
Second portion: the identification of people's face and the extraction of watermark
3) obtain the proper vector V' of people's face to be measured;
If people's face to be measured is F', after the two-dimentional DFT of overall situation conversion, obtain low frequency coefficient matrix, and to get real part coefficient be FF'(i, j), by step 1) real part matrix of coefficients is carried out to binary conversion treatment, obtain the proper vector V' of people's face to be measured;
FF'(i,j)=DFT2(F'(i,j))
FF 8'(i,j)=REAL(FF'(i,j))
V'=BINARY(FF 8'(i,j))
4) calculate the related coefficient NC (n) of the proper vector V' of people's face to be measured and the V (n) of primitive man's face, carry out the identification of people's face;
Calculate the corresponding n value of related coefficient maximal value of V' and V (n), establish n=k; According to k value, can obtain key K ey (k), identify original facial image is F (k) and the watermark value W (k) that is embedded in F (k), and the normalized correlation coefficient NC formula of calculated characteristics vector is as follows:
NC Σ i V ( i ) V ′ ( i ) Σ i V 2 ( i )
5) utilize the proper vector V' that is present in third-party two-valued function key sequence Key (k) and people's face to be measured, extract the watermark W'(k in testing image);
W'=Key(k)⊕V'
6) calculate the related coefficient between W' and W (k); Calculate the related coefficient of the watermark W' of extraction and the watermark W (k) of embedding, determine the watermark content of testing image.
CN201410229774.1A 2014-05-29 2014-05-29 Anti-occlusion face recognition method based on DFT robust watermarks under big data Pending CN103984934A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410229774.1A CN103984934A (en) 2014-05-29 2014-05-29 Anti-occlusion face recognition method based on DFT robust watermarks under big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410229774.1A CN103984934A (en) 2014-05-29 2014-05-29 Anti-occlusion face recognition method based on DFT robust watermarks under big data

Publications (1)

Publication Number Publication Date
CN103984934A true CN103984934A (en) 2014-08-13

Family

ID=51276896

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410229774.1A Pending CN103984934A (en) 2014-05-29 2014-05-29 Anti-occlusion face recognition method based on DFT robust watermarks under big data

Country Status (1)

Country Link
CN (1) CN103984934A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111275602A (en) * 2020-01-16 2020-06-12 深圳市广道高新技术股份有限公司 Face image security protection method, system and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1808495A (en) * 2006-01-18 2006-07-26 李京兵 Wavelet-based geometric attack resistant digital watermark method
CN1932878A (en) * 2006-10-16 2007-03-21 李京兵 Robust two-value text image multi-watermark realizing method
CN1932879A (en) * 2006-10-16 2007-03-21 李京兵 Method for local non-linear geometric attack resisting watermark based on image phase characteristic
JP2009135654A (en) * 2007-11-29 2009-06-18 Kddi Corp Embedding device for electronic watermark, and extraction device
CN103198329A (en) * 2013-04-19 2013-07-10 海南大学 Intelligent texture anti-counterfeiting method based on discrete Fourier transformation (DFT)

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1808495A (en) * 2006-01-18 2006-07-26 李京兵 Wavelet-based geometric attack resistant digital watermark method
CN1932878A (en) * 2006-10-16 2007-03-21 李京兵 Robust two-value text image multi-watermark realizing method
CN1932879A (en) * 2006-10-16 2007-03-21 李京兵 Method for local non-linear geometric attack resisting watermark based on image phase characteristic
JP2009135654A (en) * 2007-11-29 2009-06-18 Kddi Corp Embedding device for electronic watermark, and extraction device
CN103198329A (en) * 2013-04-19 2013-07-10 海南大学 Intelligent texture anti-counterfeiting method based on discrete Fourier transformation (DFT)

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
李京兵,等: ""一种基于DWT抗几何攻击数字水印鲁棒算法"", 《计算机仿真》 *
李京兵,等: ""一种鲁棒的二值文本图像数字水印算法及仿真"", 《计算机工程》 *
李京兵: ""一种可抗几何攻击的二值文本"", 《海南大学学报自然科学版》 *
李京兵: ""基于变换域抗几何攻击数字水印算法研究"", 《中国博士学位论文全文数据库 信息科技辑》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111275602A (en) * 2020-01-16 2020-06-12 深圳市广道高新技术股份有限公司 Face image security protection method, system and storage medium
CN111275602B (en) * 2020-01-16 2023-06-30 深圳市广道数字技术股份有限公司 Face image security protection method, system and storage medium

Similar Documents

Publication Publication Date Title
CN102184519B (en) Method for embedding and extracting watermark images
CN108776790A (en) Face encryption recognition methods based on neural network under cloud environment
CN104268823A (en) Digital watermark algorithm based on image content
CN104680473A (en) Machine learning-based color image watermark embedding and detecting method
CN103729856B (en) A kind of Fabric Defects Inspection detection method utilizing S-transformation signal extraction
CN104867102A (en) Method for encrypting medical image robust watermark based on DCT (Discrete Cosine Transform) ciphertext domain
CN102693522A (en) Method for detecting region duplication and forgery of color image
CN102024249A (en) Digital image watermarking method based on visual perception characteristics
CN102096896A (en) Three-dimensional discrete cosine transform (DCT)-based geometric attack resistant volume data watermark realization method
CN102129657A (en) Method for embedding multiple watermarks in volume data based on three-dimensional DFT (Delayed-First-Transmission)
Wang et al. Digital image watermarking based on texture block and edge detection in the discrete wavelet domain
CN102521821A (en) Automatic identification and tampered area positioning method in digital image
CN104063834A (en) Watermark embedding method, watermark detecting method and device thereof
CN102880997B (en) Method for embedding watermark image
CN104978706B (en) Watermark embedding and extracting method, device and system based on Fourier descriptor
CN100421123C (en) Robust two-value text image multi-watermark realizing method
CN101504759A (en) Digital image watermark extraction method based on DCT algorithm
CN102510492A (en) Method for embedding multiple watermarks in video based on three-dimensional DWT (Discrete Wavelet Transform) and DFT (Discrete Fourier Transform)
CN103984934A (en) Anti-occlusion face recognition method based on DFT robust watermarks under big data
CN103559676A (en) Method for preventing color image blind watermarking from being printed and scanned based on DCT coefficient statistical property
CN106778822A (en) Graph line detection method based on funnel conversion
CN1975780A (en) Robust digital watermark inserting and detecting method based on supporting vector
CN116259087A (en) Low-resolution face recognition method
CN104484850A (en) Robust image watermark detecting method based on fuzzy classification
CN103984932A (en) Anti-light face recognition method based on transform domain robust watermark under big data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140813