CN103985079A - Tampering detection method for digital image with invisible watermark - Google Patents

Tampering detection method for digital image with invisible watermark Download PDF

Info

Publication number
CN103985079A
CN103985079A CN201410217258.7A CN201410217258A CN103985079A CN 103985079 A CN103985079 A CN 103985079A CN 201410217258 A CN201410217258 A CN 201410217258A CN 103985079 A CN103985079 A CN 103985079A
Authority
CN
China
Prior art keywords
image
sub
watermark
pixel
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410217258.7A
Other languages
Chinese (zh)
Other versions
CN103985079B (en
Inventor
徐贵力
李旭
刘常德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing chain growth Technology Co.,Ltd.
Original Assignee
Nanjing Yin Mowei Electronic Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Yin Mowei Electronic Science And Technology Co Ltd filed Critical Nanjing Yin Mowei Electronic Science And Technology Co Ltd
Priority to CN201410217258.7A priority Critical patent/CN103985079B/en
Publication of CN103985079A publication Critical patent/CN103985079A/en
Application granted granted Critical
Publication of CN103985079B publication Critical patent/CN103985079B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a tampering detection method for a digital image with an invisible watermark. The tampering detection method comprises the steps that firstly, invisible watermark encryption is conducted on the digital image, wherein the host image and an encryption watermark image are respectively expressed in the form of a pixel matrix, and the pixel matrix of the encryption watermark image is embedded in the host image through a watermark encryption algorithm; then the digital image with the invisible watermark is decoded, wherein the pixel matrix of the watermark image is extracted and restored from the pixel matrix of the host image through a watermark decoding algorithm; finally, the encryption watermark image and the restored watermark image are compared, if the pixel matrix of the encryption watermark image is equal to the pixel matrix of the restored watermark image, it is indicated that the host image is not tampered, and if not, it is indicated that the host image is tampered. The tampering detection method is simple, easy and convenient to implement, capable of quickly judging whether an image is tampered, and beneficial to copyright protection.

Description

With the digital image tampering detection method of stealthy watermark
Technical field
The present invention relates to digital image watermarking technology, relate in particular to the digital image tampering detection method with stealthy watermark, belong to technical field of image processing.
Background technology
Along with the development of multimedia technology, people use and become further frequent with the digital product such as image, video, also more and more extensive to the utilization field of these digital products, so for the original identification of picture, distort to detect and become distinct issues.
Summary of the invention
The object of the present invention is to provide a kind of digital image tampering detection method with stealthy watermark, can effectively detect host image and whether distort.
The technical solution adopted in the present invention is: with the digital image tampering detection method of stealthy watermark, it is characterized in that, comprise the steps:
Step 1: digital picture is carried out to stealthy watermark encrypting: host image and encrypted watermark image are represented with picture element matrix form respectively, the picture element matrix of encrypted watermark image is embedded in host image through watermark encrypting algorithm;
Step 2: the digital picture with stealthy watermark is decoded: the picture element matrix that extracts reductive water watermark image from the picture element matrix of host image through watermark decode algorithm;
Step 3: relatively encrypted watermark image and reductive water watermark image: if the picture element matrix of encrypted watermark image equate with the picture element matrix of reductive water watermark image, illustrate that host image is not tampered, otherwise, illustrate that host image is tampered.
Described watermark encrypting algorithm comprises the steps:
1) host image and encrypted watermark image are represented with picture element matrix form respectively:
If the picture element matrix of host image by N capable × a M row arrangement of subpixels forms, and is designated as A nM, A nMin the sub-pixel of capable, the j of i row be designated as a ij; Wherein, 1≤i≤N, 1≤j≤M, 0≤a ij≤ 255;
If the picture element matrix of encrypted watermark image by n capable × a m row arrangement of subpixels forms, and is designated as B nm, B nmin the sub-pixel of capable, the t of s row be designated as b st; Wherein, 1≤s≤n, 1≤t≤m, 0≤b st≤ 255;
Wherein, N >=n, M >=3m;
2) extract B nmhundred, ten, individual position of sub-pixel: establish sub-pixel b sthundred, ten, individual position be designated as respectively x, y, z;
3) by A nMin the position of sub-pixel to be encrypted make zero: selected A nMthe middle value of being expert at is not more than n, and the sub-pixel that place train value is not more than 3m is sub-pixel to be encrypted, made zero in a position for sub-pixel to be encrypted, and the sub-pixel a'' after i is capable, j row make zero ijrepresent;
4) encrypted watermark image is embedded to host image: by A nMin the sub-pixel of capable, the j of i row after encrypting be designated as
By sub-pixel b sthundred x and a'' s (3t-2)be added,
By sub-pixel b stten y and a'' s (3t-1)be added,
By sub-pixel b stposition z and a'' s (3t)be added,
The rest may be inferred, until by B nmin all sub-pixels be embedded into A nMin, A nMin the sub-pixel that is not encrypted remain unchanged, obtain thus the image pixel matrix C after encrypting nM.
Described watermark decode algorithm comprises the steps:
1) selected C nMthe middle value of being expert at is not more than n, and the region that place train value is not more than 3m is region to be decoded;
2) in region to be decoded, with behavior unit, from left to right successively at C nMin get three sub-pixels, and extract the units of three sub-pixels: establish from C nMin three capable got sub-pixels of p be respectively wherein, units be designated as x ', units be designated as y ', units be designated as z ';
3) units of three sub-pixels is multiplied by respectively to 100,10,1, and summation, reduction draws the picture element matrix of reductive water watermark image in sub-pixel: b p ( q + 2 3 ) o = 100 x , + 10 y , + 1 z , , represent in p capable, the sub-pixel of row.
Compared with prior art, the beneficial effect that the present invention reaches: a kind of digital image tampering detection method with stealthy watermark is provided, and its algorithm is simple, easy to operation, can judge that whether image distorts detection, is beneficial to copyright protection fast; By adjusting unessential data, less on the visual effect impact of original image; And the method calculated amount is little, requirement of real time.
Brief description of the drawings
Fig. 1 is operational flowchart of the present invention.
Embodiment
Following examples are only for technical scheme of the present invention is more clearly described, and can not limit the scope of the invention with this.
As shown in Figure 1, with the digital image tampering detection method of stealthy watermark, comprise the steps:
Step 1: digital picture is carried out to stealthy watermark encrypting: host image and encrypted watermark image are represented with picture element matrix form respectively, the picture element matrix of encrypted watermark image is embedded in host image through watermark encrypting algorithm.
Watermark encrypting algorithm comprises the steps:
1) host image and encrypted watermark image are represented with picture element matrix form respectively:
If the picture element matrix of host image by N capable × a M row arrangement of subpixels forms, and is designated as A nM, A nMin the sub-pixel of capable, the j of i row be designated as ai j; Wherein, 1≤i≤N, 1≤j≤M, 0≤ai j≤ 255;
If the picture element matrix of encrypted watermark image by n capable × a m row arrangement of subpixels forms, and is designated as B nm, B nmin the sub-pixel of capable, the t of s row be designated as b st; Wherein, 1≤s≤n, 1≤t≤m, 0≤b st≤ 255;
Wherein, N >=n, M >=3m;
2) extract B nmhundred, ten, individual position of sub-pixel: establish sub-pixel b sthundred, ten, individual position be designated as respectively x, y, z;
3) by A nMin the position of sub-pixel to be encrypted make zero: selected A nMthe middle value of being expert at is not more than n, and the sub-pixel that place train value is not more than 3m is sub-pixel to be encrypted, made zero in a position for sub-pixel to be encrypted, and the sub-pixel a'' after i is capable, j row make zero ijrepresent;
4) encrypted watermark image is embedded to host image: by A nMin the sub-pixel of capable, the j of i row after encrypting be designated as
By sub-pixel b sthundred x and a'' s (3t-2)be added,
By sub-pixel b stten y and a'' s (3t-1)be added,
By sub-pixel b stposition z and a'' s (3t)be added,
The rest may be inferred, until by B nmin all sub-pixels be embedded into A nMin, A nMin the sub-pixel that is not encrypted remain unchanged, obtain thus the image pixel matrix C after encrypting nM.
Now for example above-mentioned watermark encrypting algorithm is further explained to explanation: host image is represented with picture element matrix form, be assumed to be hypothesis A nMbe 8 row 8 column matrix:
A 8 × 8 a 11 a 12 . . . a 81 a 21 a 22 . . . a 82 . . . . . . . . . . . . a 81 a 82 . . . a 88
Equally, encrypted watermark image is represented with picture element matrix form, suppose B nmbe 2 row 2 column matrix:
B 2 × 2 = b 11 b 12 b 21 b 22
Suppose a 11=207, a 12=143, a 13=89, b 11=120, extract b 11hundred, ten, individual position be designated as respectively x, y, z, x=1, y=2, z=0, with b 11corresponding sub-pixel to be encrypted is a 11, a 12, a 13, by a 11, a 12, a 13position make zero, obtain a'' 11, a'' 12, a'' 13, a'' 11=200, a'' 12=140, a'' 13=80, then by x and a'' 11be added, obtain by y and a'' 12be added, obtain by z and a'' 13be added, obtain identical, if a 14=137, a 15=123, a 16=29, b 12=13, a 14 o = 130 + 0 = 130 , a 15 o = 120 + 1 = 121 , a 16 o = 20 + 3 = 23 ; If a 21=47, a 22=142, a 23=189, b 21=246, a 21 o = 40 + 2 = 42 , a 22 o = 140 + 4 = 144 , a 23 o = 180 + 6 = 186 ; If a 24=242, a 25=172, a 26=191, b 22=135, a 24 o = 240 + 1 = 241 , a 25 o = 170 + 3 = 173 , a 26 o = 190 + 5 = 195 . A 8 × 8in the sub-pixel that is not encrypted remain unchanged, obtain thus the image pixel matrix C after encrypting 8 × 8:
C 8 × 8 201 142 80 130 121 23 a 17 a 18 42 144 186 241 173 195 a 27 a 28 a 13 a 32 a 33 a 34 a 35 a 36 a 37 a 38 . . . . . . . . . . . . . . . . . . . . . . . . a 81 a 82 a 83 a 84 a 85 a 86 a 87 a 88
Step 2: the digital picture with stealthy watermark is decoded: the picture element matrix that extracts reductive water watermark image from the picture element matrix of host image through watermark decode algorithm;
Watermark decode algorithm comprises the steps:
1) selected C nMthe middle value of being expert at is not more than n, and the region that place train value is not more than 3m is region to be decoded;
2) in region to be decoded, with behavior unit, from left to right successively at C nMin get three sub-pixels, and extract the units of three sub-pixels: establish from C nMin three capable got sub-pixels of p be respectively wherein, units be designated as x ', units be designated as y ', units be designated as z ';
3) units of three sub-pixels is multiplied by respectively to 100,10,1, and summation, reduction draws the picture element matrix of reductive water watermark image in sub-pixel: b p ( q + 2 3 ) o = 100 x , + 10 y , + 1 z , , represent in p capable, the sub-pixel of row.
Now with the image pixel matrix C after encrypting 8 × 8for example:
C 8 × 8 201 142 80 130 121 23 a 17 a 18 42 144 186 241 173 195 a 27 a 28 a 13 a 32 a 33 a 34 a 35 a 36 a 37 a 38 . . . . . . . . . . . . . . . . . . . . . . . . a 81 a 82 a 83 a 84 a 85 a 86 a 87 a 88
To C 8 × 8the computing of decoding, the picture element matrix B of known encryption watermarking images nmbe 2 row 2 column matrix, i.e. n=m=2, C 8 × 8middle row value is not more than 2, and it is region to be decoded that train value is not more than 6 region, from C 8 × 8the first row starts, and 3 are one group and get sub-pixel from left to right, and first group is: units be designated as x '=1, units be designated as y '=2, units be designated as z '=0; b 1 ( 1 + 2 3 ) o = b 11 o = 1 × 100 + 2 × 10 + 0 × 1 = 120 , Second group is: a 14 o = 130 , a 15 o = 121 , a 16 o = 23 , units be designated as x '=0, units be designated as y '=1, units be designated as z '=3; after the first row has been decoded, continue the second row decoding, draw b 2 ( 1 + 2 3 ) o = b 21 o = 2 × 100 + 4 × 10 + 6 × 1 = 246 , b 2 ( 4 + 2 3 ) o = b 22 o = 1 × 100 + 3 × 10 + 5 × 1 = 135 , Obtain thus the picture element matrix of reductive water watermark image
B 2 × 2 o = 120 13 246 135
Step 3: relatively encrypted watermark image and reductive water watermark image: if the picture element matrix of encrypted watermark image equate with the picture element matrix of reductive water watermark image, illustrate that host image is not tampered, otherwise, illustrate that host image is tampered.Even B 2 × 2with equate, illustrate that host image is not tampered, otherwise, illustrate that host image is tampered.
The above is only the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, do not departing under the prerequisite of the technology of the present invention principle; can also make some improvement and distortion, these improvement and distortion also should be considered as protection scope of the present invention.

Claims (3)

1. the digital image tampering detection method with stealthy watermark, is characterized in that, comprises the steps:
Step 1: digital picture is carried out to stealthy watermark encrypting: host image and encrypted watermark image are represented with picture element matrix form respectively, the picture element matrix of encrypted watermark image is embedded in host image through watermark encrypting algorithm;
Step 2: the digital picture with stealthy watermark is decoded: the picture element matrix that extracts reductive water watermark image from the picture element matrix of host image through watermark decode algorithm;
Step 3: relatively encrypted watermark image and reductive water watermark image: if the picture element matrix of encrypted watermark image equate with the picture element matrix of reductive water watermark image, illustrate that host image is not tampered, otherwise, illustrate that host image is tampered.
2. the digital image tampering detection method of the stealthy watermark of band according to claim 1, is characterized in that, described watermark encrypting algorithm comprises the steps:
1) host image and encrypted watermark image are represented with picture element matrix form respectively:
If the picture element matrix of host image by N capable × a M row arrangement of subpixels forms, and is designated as A nM, A nMin the sub-pixel of capable, the j of i row be designated as a ij; Wherein, 1≤i≤N, 1≤j≤M, 0≤a ij≤ 255;
If the picture element matrix of encrypted watermark image by n capable × a m row arrangement of subpixels forms, and is designated as B nm, B nmin the sub-pixel of capable, the t of s row be designated as b st; Wherein, 1≤s≤n, 1≤t≤m, 0≤b st≤ 255;
Wherein, N >=n, M >=3m;
2) extract B nmhundred, ten, individual position of sub-pixel: establish sub-pixel b sthundred, ten, individual position be designated as respectively x, y, z;
3) by A nMin the position of sub-pixel to be encrypted make zero: selected A nMthe middle value of being expert at is not more than n, and the sub-pixel that place train value is not more than 3m is sub-pixel to be encrypted, made zero in a position for sub-pixel to be encrypted, and the sub-pixel a' after i is capable, j row make zero i' jrepresent;
4) encrypted watermark image is embedded to host image: by A nMin the sub-pixel of capable, the j of i row after encrypting be designated as
By sub-pixel b st'shundred x and a'' s (3t-2)be added,
By sub-pixel b stten y and a'' s (3t-1)be added,
By sub-pixel b stposition z and a'' s (3t)be added,
The rest may be inferred, until by B nmin all sub-pixels be embedded into A nMin, A nMin the sub-pixel that is not encrypted remain unchanged, obtain thus the image pixel matrix C after encrypting nM.
3. the digital image tampering detection method of the stealthy watermark of band according to claim 2, is characterized in that, described watermark decode algorithm comprises the steps:
1) selected C nMthe middle value of being expert at is not more than n, and the region that place train value is not more than 3m is region to be decoded;
2) in region to be decoded, with behavior unit, from left to right successively at C nMin get three sub-pixels, and extract the units of three sub-pixels: establish from C nMin pthree sub-pixels that row is got are respectively wherein, units be designated as x ', units be designated as y ', units be designated as z ';
3) units of three sub-pixels is multiplied by respectively to 100,10,1, and summation, reduction draws the picture element matrix of reductive water watermark image in sub-pixel: b p ( q + 2 3 ) o = 100 x , + 10 y , + 1 z , , represent p is capable, the the sub-pixel of row.
CN201410217258.7A 2014-05-21 2014-05-21 Digital image tampering detection method with stealthy watermark Active CN103985079B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410217258.7A CN103985079B (en) 2014-05-21 2014-05-21 Digital image tampering detection method with stealthy watermark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410217258.7A CN103985079B (en) 2014-05-21 2014-05-21 Digital image tampering detection method with stealthy watermark

Publications (2)

Publication Number Publication Date
CN103985079A true CN103985079A (en) 2014-08-13
CN103985079B CN103985079B (en) 2017-03-29

Family

ID=51277037

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410217258.7A Active CN103985079B (en) 2014-05-21 2014-05-21 Digital image tampering detection method with stealthy watermark

Country Status (1)

Country Link
CN (1) CN103985079B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110569627A (en) * 2019-08-01 2019-12-13 北京大米科技有限公司 Image processing method and device and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1930868A (en) * 2004-03-29 2007-03-14 冲电气工业株式会社 Printing medium quality adjusting system, examining watermark medium output device, watermark quality examining device, adjusted watermark medium output device, printing medium quality adjusting metho
CN101101665A (en) * 2007-07-26 2008-01-09 北京交通大学 Image authentication method based on feedback chaos system and neighborhood assistance
CN101582158A (en) * 2009-06-26 2009-11-18 中山大学 Method for embedding and authenticating watermark of digital image
CN102024245A (en) * 2009-09-10 2011-04-20 广州市百成科技有限公司 Fragile watermarking technology-based electronic seal protection method
CN103106636A (en) * 2013-02-28 2013-05-15 大连民族学院 Gray image watermark embedding and extracting method based on singular value decomposition

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1930868A (en) * 2004-03-29 2007-03-14 冲电气工业株式会社 Printing medium quality adjusting system, examining watermark medium output device, watermark quality examining device, adjusted watermark medium output device, printing medium quality adjusting metho
CN101101665A (en) * 2007-07-26 2008-01-09 北京交通大学 Image authentication method based on feedback chaos system and neighborhood assistance
CN101582158A (en) * 2009-06-26 2009-11-18 中山大学 Method for embedding and authenticating watermark of digital image
CN102024245A (en) * 2009-09-10 2011-04-20 广州市百成科技有限公司 Fragile watermarking technology-based electronic seal protection method
CN103106636A (en) * 2013-02-28 2013-05-15 大连民族学院 Gray image watermark embedding and extracting method based on singular value decomposition

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110569627A (en) * 2019-08-01 2019-12-13 北京大米科技有限公司 Image processing method and device and electronic equipment
CN110569627B (en) * 2019-08-01 2021-08-20 北京大米科技有限公司 Image processing method and device and electronic equipment

Also Published As

Publication number Publication date
CN103985079B (en) 2017-03-29

Similar Documents

Publication Publication Date Title
Bandyopadhyay et al. A novel secure image steganography method based on chaos theory in spatial domain
CN101604439A (en) A kind of color image encrypting method based on multi-chaos system
CN102968756A (en) Color image watermark embedding and extraction method based on fractional order hyper-chaos and discrete wavelet transform-singular value decomposition (DWT-SVD)
Pan et al. Image steganography method based on PVD and modulus function
CN104537600A (en) Secondary image encrypting and decrypting methods and watermark information tamper area positioning method
CN102184519A (en) Method for embedding and extracting watermark images
CN104637026B (en) One kind is based on continuous multipage text image watermark insertion and extracting method
CN105260981A (en) Optimal coupling image steganography method based on packet replacement
CN104835106B (en) A kind of full frequency-domain subband data waterprint embedded method based on wavelet decomposition
CN102446211A (en) Method and system for filing and verifying image
CN103559251B (en) Data security protection method based on Information hiding
CN104486627B (en) A kind of embedding algorithm, detection and extracting method
CN102142129A (en) Visual secret sharing-based image content tampering detection method
CN104008519A (en) Image watermarking method based on fractional order chaotic mapping and weighted average
CN103971321B (en) Method and system for steganalysis of JPEG compatibility
CN103428503B (en) A kind of method and apparatus of watermark extracting in Digital Media
CN103985079A (en) Tampering detection method for digital image with invisible watermark
CN102156956B (en) High robustness watermark method based on singular value decomposition and discrete cosine transform
CN109064381B (en) Multi-dimensional digital watermark encryption method based on secret key
CN109255748B (en) Digital watermark processing method and system based on double-tree complex wavelet
CN106056521A (en) RSD attack resistant digital fingerprint blind detection method based on difference feature point grid
CN105208462B (en) Video digital watermark processing method and the video digital watermark system for performing this method
CN102156954B (en) QR-decomposition-based digital image watermark embedding method and digital image authentication method
Zhang et al. Research on video copyright protection system
CN101719261B (en) Method for controlling embedding strength of digital watermark based on transformation kernel

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20191204

Address after: Room 1,020, Nanxun Science and Technology Pioneering Park, No. 666 Chaoyang Road, Nanxun District, Huzhou City, Zhejiang Province, 313000

Patentee after: Huzhou You Yan Intellectual Property Service Co., Ltd.

Address before: The stone of Baixia District of Nanjing city in Jiangsu province 210000 Yang Road No. 56 Baixia high-tech industrial park business park A District No. 3 building 132 room

Patentee before: Nanjing Yin Mowei Electronic Science and Technology Co., Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201211

Address after: Room 074, Room 301, 3rd floor, No.70, Haidian West Street, Haidian District, Beijing 100089

Patentee after: Beijing chain growth Technology Co.,Ltd.

Address before: 313000 room 1020, science and Technology Pioneer Park, 666 Chaoyang Road, Nanxun Town, Nanxun District, Huzhou, Zhejiang.

Patentee before: Huzhou You Yan Intellectual Property Service Co.,Ltd.

TR01 Transfer of patent right