CN103985079B - Digital image tampering detection method with stealthy watermark - Google Patents

Digital image tampering detection method with stealthy watermark Download PDF

Info

Publication number
CN103985079B
CN103985079B CN201410217258.7A CN201410217258A CN103985079B CN 103985079 B CN103985079 B CN 103985079B CN 201410217258 A CN201410217258 A CN 201410217258A CN 103985079 B CN103985079 B CN 103985079B
Authority
CN
China
Prior art keywords
sub
image
pixel
watermark
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410217258.7A
Other languages
Chinese (zh)
Other versions
CN103985079A (en
Inventor
徐贵力
李旭
刘常德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing chain growth Technology Co.,Ltd.
Original Assignee
Nanjing Yin Mowei Electronic Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Yin Mowei Electronic Science And Technology Co Ltd filed Critical Nanjing Yin Mowei Electronic Science And Technology Co Ltd
Priority to CN201410217258.7A priority Critical patent/CN103985079B/en
Publication of CN103985079A publication Critical patent/CN103985079A/en
Application granted granted Critical
Publication of CN103985079B publication Critical patent/CN103985079B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a kind of digital image tampering detection method with stealthy watermark, carries out stealthy watermark encrypting to digital picture first:Host image and encrypted watermark image are represented with picture element matrix form respectively, the picture element matrix Jing watermark encrypting algorithms of encrypted watermark image are embedded in host image;Secondly the digital picture of band stealth watermark is decoded:The picture element matrix of reduction watermarking images is extracted from the picture element matrix of host image through watermark decoding algorithm;Finally compare encrypted watermark image and reduction watermarking images:If the picture element matrix of encrypted watermark image is equal with the picture element matrix of reduction watermarking images, illustrates that host image is not tampered with, otherwise, illustrate that host image is tampered.Inventive algorithm is simple, easy to operation, can quickly judge whether image occurs tampering detection, beneficial to copyright protection.

Description

Digital image tampering detection method with stealthy watermark
Technical field
The present invention relates to digital image watermarking technology, more particularly to the digital image tampering detection method with stealthy watermark, Belong to technical field of image processing.
Background technology
With the development of multimedia technology, people become further frequent using with digital products such as image, videos, to these The utilization field of digital product also more and more extensively, so the original identification, tampering detection for picture become one it is prominent Problem.
The content of the invention
It is an object of the invention to provide a kind of digital image tampering detection method with stealthy watermark, can effective detection place Whether master image distorts.
The technical solution adopted in the present invention is:Digital image tampering detection method with stealthy watermark, including following step Suddenly:
Step one:Stealthy watermark encrypting is carried out to digital picture:By host image and encrypted watermark image respectively with pixel Matrix form represents, the picture element matrix Jing watermark encrypting algorithms of encrypted watermark image is embedded in host image;
Step 2:The digital picture of band stealth watermark is decoded:Through watermark from the picture element matrix of host image Decoding algorithm extracts the picture element matrix of reduction watermarking images;
Step 3:Compare encrypted watermark image and reduction watermarking images:If the picture element matrix of encrypted watermark image and reduction The picture element matrix of watermarking images is equal, then illustrate that host image is not tampered with, otherwise, illustrate that host image is tampered.
The watermark encrypting algorithm comprises the steps:
1) host image and encrypted watermark image are represented with picture element matrix form respectively:
If the picture element matrix of host image is made up of N rows × M row arrangement of subpixels, A is designated asNM, ANMIn the i-th row, jth The sub-pixel of row is designated as aij;Wherein, 1≤i≤N, 1≤j≤M, 0≤aij≤255;
If the picture element matrix of encrypted watermark image is made up of n rows × m row arrangement of subpixels, B is designated asnm, BnmIn s rows, The sub-pixel of t row is designated as bst;Wherein, 1≤s≤n, 1≤t≤m, 0≤bst≤255;
Wherein, N >=n, M >=3m;
2) extract BnmHundred, ten, individual position of sub-pixel:If sub-pixel bstHundred, ten, individual position be designated as respectively x, y、z;
3) by ANMIn sub-pixel to be encrypted individual position zero:Selected ANMMiddle be expert at value is not more than n, and place train value No more than the sub-pixel of 3m is sub-pixel to be encrypted, by the individual position zero of sub-pixel to be encrypted, the son after the i-th row, jth row zero Pixel is with a "ijRepresent;
4) by encrypted watermark image embedded host image:By ANMIn the i-th row, jth row encryption after sub-pixel be designated as
By sub-pixel bstHundred x and a "s(3t-2)It is added, then
By sub-pixel bstTen y and a "s(3t-1)It is added, then
By sub-pixel bstIndividual position z and a "s(3t)It is added, then
The rest may be inferred, until by BnmIn all sub-pixels be embedded into ANMIn, ANMIn the sub-pixel that is not encrypted protect Hold constant, image pixel matrix C after thus being encryptedNM
The watermark decoding algorithm comprises the steps:
1) select CNMIn so that be expert at value is by n and place train value is 1 with value of being expert at for 3m and place train value is two of 1 It is region to be decoded that element is rectangular area determined by summit;
2) in region to be decoded, with behavior unit, from left to right successively in CNMIn take three sub-pixels, and extract three The units of sub-pixel:If from CNMThree sub-pixels that middle pth row is taken are respectivelyWherein,'s Units is designated as x ',Units be designated as y ',Units be designated as z ';Q represents first sub- picture that p rows are taken The train value of element;
3) units of three sub-pixels is multiplied by into 100,10,1 respectively, and is sued for peace, reduction draws reduction watermarking images Picture element matrixIn sub-pixel: RepresentMiddle pth row, the The sub-pixel of row.
Compared with prior art, the beneficial effect reached by the present invention:There is provided a kind of digital picture with stealthy watermark Altering detecting method, its algorithm are simple, easy to operation, can quickly judge whether image occurs tampering detection, beneficial to version Power protection;By adjusting unessential data, less is affected on the visual effect of original image;Also, the method amount of calculation is little, Meet requirement of real-time.
Description of the drawings
Fig. 1 is the operational flowchart of the present invention.
Specific embodiment
Following examples are only used for clearly illustrating technical scheme, and can not limit the present invention with this Protection domain.
As shown in figure 1, the digital image tampering detection method with stealthy watermark, comprises the steps:
Step one:Stealthy watermark encrypting is carried out to digital picture:By host image and encrypted watermark image respectively with pixel Matrix form represents, the picture element matrix Jing watermark encrypting algorithms of encrypted watermark image is embedded in host image.
Watermark encrypting algorithm comprises the steps:
1) host image and encrypted watermark image are represented with picture element matrix form respectively:
If the picture element matrix of host image is made up of N rows × M row arrangement of subpixels, A is designated asNM, ANMIn the i-th row, jth The sub-pixel of row is designated as aij;Wherein, 1≤i≤N, 1≤j≤M, 0≤aij≤255;
If the picture element matrix of encrypted watermark image is made up of n rows × m row arrangement of subpixels, B is designated asnm, BnmIn s rows, The sub-pixel of t row is designated as bst;Wherein, 1≤s≤n, 1≤t≤m, 0≤bst≤255;
Wherein, N >=n, M >=3m;
2) extract BnmHundred, ten, individual position of sub-pixel:If sub-pixel bstHundred, ten, individual position be designated as respectively x, y、z;
3) by ANMIn sub-pixel to be encrypted individual position zero:Selected ANMMiddle be expert at value is not more than n, and place train value No more than the sub-pixel of 3m is sub-pixel to be encrypted, by the individual position zero of sub-pixel to be encrypted, the son after the i-th row, jth row zero Pixel is with a "ijRepresent;
4) by encrypted watermark image embedded host image:By ANMIn the i-th row, jth row encryption after sub-pixel be designated as
By sub-pixel bstHundred x and a "s(3t-2)It is added, then
By sub-pixel bstTen y and a "s(3t-1)It is added, then
By sub-pixel bstIndividual position z and a "s(3t)It is added, then
The rest may be inferred, until by BnmIn all sub-pixels be embedded into ANMIn, ANMIn the sub-pixel that is not encrypted protect Hold constant, image pixel matrix C after thus being encryptedNM
Now to illustrate explanation is further explained to above-mentioned watermark encrypting algorithm:By host image with picture element matrix form table Show, it is assumed that to assume ANMFor 8 row, 8 column matrix:
Equally, encrypted watermark image is represented with picture element matrix form, it is assumed that BnmFor 2 row, 2 column matrix:
Assume a11=207, a12=143, a13=89, b11=120, extract b11Hundred, ten, individual position be designated as respectively x, Y, z, then x=1, y=2, z=0, with b11Corresponding sub-pixel to be encrypted is a11, a12, a13, by a11, a12, a13Individual position return Zero, obtain a "11, a "12, a "13, then a "11=200, a "12=140, a "13=80, then by x and a "11It is added, obtainsBy y and a "12It is added, obtainsBy z and a "13It is added, obtainsIdentical, if a14=137, a15=123, a16=29, b12=13, thenIf a21=47, a22=142, a23=189, b21=246, ThenIf a24=242, a25=172, a26=191, b22= 135, thenA8×8In be not encrypted Sub-pixel keep constant, image pixel matrix C after thus being encrypted8×8
Step 2:The digital picture of band stealth watermark is decoded:Through watermark from the picture element matrix of host image Decoding algorithm extracts the picture element matrix of reduction watermarking images;
Watermark decoding algorithm comprises the steps:
1) select CNMIn so that be expert at value is by n and place train value is 1 with value of being expert at for 3m and place train value is two of 1 It is region to be decoded that element is rectangular area determined by summit;
2) in region to be decoded, with behavior unit, from left to right successively in CNMIn take three sub-pixels, and extract three The units of sub-pixel:If from CNMThree sub-pixels that middle pth row is taken are respectivelyWherein,'s Units is designated as x ',Units be designated as y ',Units be designated as z ';Q represents first sub- picture that p rows are taken The train value of element;
3) units of three sub-pixels is multiplied by into 100,10,1 respectively, and is sued for peace, reduction draws reduction watermarking images Picture element matrixIn sub-pixel: RepresentMiddle pth row, the The sub-pixel of row.
Now with image pixel matrix C after encryption8×8As a example by:
To C8×8Carry out decoding computing, it is known that the picture element matrix B of encrypted watermark imagenmFor 2 row, 2 column matrix, i.e. n=m=2, C8×8Middle row value is not more than 2, and it is region to be decoded that train value is not more than 6 region, from C8×8The first row starts, and 3 are from left to right One group takes sub-pixel, and first group is: Units be designated as x '=1, Digit is designated as y '=2,Units be designated as z '=0;Second group is: Units be designated as x '=0,Units be designated as y '=1,Individual position Number scale is z '=3;After the completion of the first row decoding, continue the decoding of the second row, Draw Thus obtain reducing the picture element matrix of watermarking images
Step 3:Compare encrypted watermark image and reduction watermarking images:If the picture element matrix of encrypted watermark image and reduction The picture element matrix of watermarking images is equal, then illustrate that host image is not tampered with, otherwise, illustrate that host image is tampered.Even B2×2 WithIt is equal, then illustrate that host image is not tampered with, and otherwise, illustrates that host image is tampered.
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, on the premise of without departing from the technology of the present invention principle, some improvement and deformation can also be made, these improve and deform Also should be regarded as protection scope of the present invention.

Claims (2)

1. the digital image tampering detection method with stealthy watermark, it is characterised in that comprise the steps:
Step one:Stealthy watermark encrypting is carried out to digital picture:By host image and encrypted watermark image respectively with picture element matrix Form represents, the picture element matrix Jing watermark encrypting algorithms of encrypted watermark image is embedded in host image;
The watermark encrypting algorithm comprises the steps:
1) host image and encrypted watermark image are represented with picture element matrix form respectively:
If the picture element matrix of host image is made up of N rows × M row arrangement of subpixels, A is designated asNM, ANMIn the i-th row, jth row son Pixel is designated as aij;Wherein, 1≤i≤N, 1≤j≤M, 0≤aij≤255;
If the picture element matrix of encrypted watermark image is made up of n rows × m row arrangement of subpixels, B is designated asnm, BnmIn s rows, t row Sub-pixel be designated as bst;Wherein, 1≤s≤n, 1≤t≤m, 0≤bst≤255;
Wherein, N >=n, M >=3m;
2) extract BnmHundred, ten, individual position of sub-pixel:If sub-pixel bstHundred, ten, individual position be designated as x, y, z respectively;
3) by ANMIn sub-pixel to be encrypted individual position zero:Selected ANMMiddle be expert at value is not more than n, and place train value is not more than The sub-pixel of 3m is sub-pixel to be encrypted, and the individual position zero of sub-pixel to be encrypted, the sub-pixel after the i-th row, jth row zero are used a″ijRepresent;
4) by encrypted watermark image embedded host image:By ANMIn the i-th row, jth row encryption after sub-pixel be designated as
By sub-pixel bstHundred x and a "s(3t-2)It is added, then
By sub-pixel bstTen y and a "s(3t-1)It is added, then
By sub-pixel bstIndividual position z and a "s(3t)It is added, then
The rest may be inferred, until by BnmIn all sub-pixels be embedded into ANMIn, ANMIn the sub-pixel that is not encrypted keep not Become, image pixel matrix C after thus being encryptedNM
Step 2:The digital picture of band stealth watermark is decoded:Decode through watermark from the picture element matrix of host image Algorithm extracts the picture element matrix of reduction watermarking images;
Step 3:Compare encrypted watermark image and reduction watermarking images:If the picture element matrix of encrypted watermark image and reduction watermark The picture element matrix of image is equal, then illustrate that host image is not tampered with, otherwise, illustrate that host image is tampered.
2. the digital image tampering detection method with stealthy watermark according to claim 1, it is characterised in that the watermark Decoding algorithm comprises the steps:
1) select CNMIn be expert at value by n and place train value for 3m be expert at value be 1 and place train value be 1 two elements The rectangular area determined by summit is region to be decoded;
2) in region to be decoded, with behavior unit, from left to right successively in CNMIn take three sub-pixels, and extract three sub- pictures The units of element:If from CNMThree sub-pixels that middle pth row is taken are respectivelyWherein,Individual position Number scale is x ',Units be designated as y ',Units be designated as z ';Q represents first sub-pixel that p rows are taken Train value;
3) units of three sub-pixels is multiplied by into 100,10,1 respectively, and is sued for peace, reduction draws the pixel of reduction watermarking images MatrixIn sub-pixel: RepresentMiddle pth row, theThe sub- picture of row Element.
CN201410217258.7A 2014-05-21 2014-05-21 Digital image tampering detection method with stealthy watermark Active CN103985079B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410217258.7A CN103985079B (en) 2014-05-21 2014-05-21 Digital image tampering detection method with stealthy watermark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410217258.7A CN103985079B (en) 2014-05-21 2014-05-21 Digital image tampering detection method with stealthy watermark

Publications (2)

Publication Number Publication Date
CN103985079A CN103985079A (en) 2014-08-13
CN103985079B true CN103985079B (en) 2017-03-29

Family

ID=51277037

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410217258.7A Active CN103985079B (en) 2014-05-21 2014-05-21 Digital image tampering detection method with stealthy watermark

Country Status (1)

Country Link
CN (1) CN103985079B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110569627B (en) * 2019-08-01 2021-08-20 北京大米科技有限公司 Image processing method and device and electronic equipment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1930868A (en) * 2004-03-29 2007-03-14 冲电气工业株式会社 Printing medium quality adjusting system, examining watermark medium output device, watermark quality examining device, adjusted watermark medium output device, printing medium quality adjusting metho
CN100461214C (en) * 2007-07-26 2009-02-11 北京交通大学 Image authentication method based on feedback chaos system and neighborhood assistance
CN101582158B (en) * 2009-06-26 2011-12-07 中山大学 Method for embedding and authenticating watermark of digital image
CN102024245B (en) * 2009-09-10 2013-03-27 广州市百成科技有限公司 Fragile watermarking technology-based electronic seal protection method
CN103106636A (en) * 2013-02-28 2013-05-15 大连民族学院 Gray image watermark embedding and extracting method based on singular value decomposition

Also Published As

Publication number Publication date
CN103985079A (en) 2014-08-13

Similar Documents

Publication Publication Date Title
Lu et al. Real-time contrast preserving decolorization
JP5269033B2 (en) Image privacy masking method and apparatus
US9218638B2 (en) Method, system, and computer-readable medium for embedding and extracting a watermark in a video
CN107911698B (en) The embedding grammar and detection method of video digital watermark information
WO2012030869A4 (en) Multi-image face-based image processing
CN101604439A (en) A kind of color image encrypting method based on multi-chaos system
CN109191361A (en) Image Watermarking, extracting method and correlation technique
Chung et al. Distortion reduction for histogram modification-based reversible data hiding
CN108038488B (en) Robustness image hashing method based on SIFT and LBP mixing
Nilizadeh et al. Information Hiding in RGB Images Using an Improved Matrix Pattern Approach.
Deng et al. Color image watermarking using regularized extreme learning machine
CN103985079B (en) Digital image tampering detection method with stealthy watermark
CN104486627B (en) A kind of embedding algorithm, detection and extracting method
WO2020237881A1 (en) Method and apparatus for injecting anti-counterfeit information, computer device, and storage medium
CN104503962A (en) Method for detecting hidden link of webpage
CN110069907A (en) Big data source tracing method and system based on digital watermarking
CN112699400A (en) Image information security processing method and device
Cui et al. Research on region selection strategy for visible watermark embedding
CN109255748B (en) Digital watermark processing method and system based on double-tree complex wavelet
An et al. Research on digital watermark technology based on LSB algorithm
CN110276707A (en) A kind of protection of image data and tampering detection technical solution
CN115526282A (en) Watermark encryption method, watermark extraction method, device and storage medium
CN202535486U (en) Device and system for preventing video fingerprint attack
US20190174180A1 (en) Usage rules enforcement
CN103634699A (en) Method and system for embedding and extracting watermark in video

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20191204

Address after: Room 1,020, Nanxun Science and Technology Pioneering Park, No. 666 Chaoyang Road, Nanxun District, Huzhou City, Zhejiang Province, 313000

Patentee after: Huzhou You Yan Intellectual Property Service Co., Ltd.

Address before: The stone of Baixia District of Nanjing city in Jiangsu province 210000 Yang Road No. 56 Baixia high-tech industrial park business park A District No. 3 building 132 room

Patentee before: Nanjing Yin Mowei Electronic Science and Technology Co., Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201211

Address after: Room 074, Room 301, 3rd floor, No.70, Haidian West Street, Haidian District, Beijing 100089

Patentee after: Beijing chain growth Technology Co.,Ltd.

Address before: 313000 room 1020, science and Technology Pioneer Park, 666 Chaoyang Road, Nanxun Town, Nanxun District, Huzhou, Zhejiang.

Patentee before: Huzhou You Yan Intellectual Property Service Co.,Ltd.

TR01 Transfer of patent right