CN103985079B - Digital image tampering detection method with stealthy watermark - Google Patents

Digital image tampering detection method with stealthy watermark Download PDF

Info

Publication number
CN103985079B
CN103985079B CN201410217258.7A CN201410217258A CN103985079B CN 103985079 B CN103985079 B CN 103985079B CN 201410217258 A CN201410217258 A CN 201410217258A CN 103985079 B CN103985079 B CN 103985079B
Authority
CN
China
Prior art keywords
sub
image
watermark
pixel
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410217258.7A
Other languages
Chinese (zh)
Other versions
CN103985079A (en
Inventor
徐贵力
李旭
刘常德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Chain Growth Technology Co ltd
Original Assignee
Nanjing Yin Mowei Electronic Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Yin Mowei Electronic Science And Technology Co Ltd filed Critical Nanjing Yin Mowei Electronic Science And Technology Co Ltd
Priority to CN201410217258.7A priority Critical patent/CN103985079B/en
Publication of CN103985079A publication Critical patent/CN103985079A/en
Application granted granted Critical
Publication of CN103985079B publication Critical patent/CN103985079B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a kind of digital image tampering detection method with stealthy watermark, carries out stealthy watermark encrypting to digital picture first:Host image and encrypted watermark image are represented with picture element matrix form respectively, the picture element matrix Jing watermark encrypting algorithms of encrypted watermark image are embedded in host image;Secondly the digital picture of band stealth watermark is decoded:The picture element matrix of reduction watermarking images is extracted from the picture element matrix of host image through watermark decoding algorithm;Finally compare encrypted watermark image and reduction watermarking images:If the picture element matrix of encrypted watermark image is equal with the picture element matrix of reduction watermarking images, illustrates that host image is not tampered with, otherwise, illustrate that host image is tampered.Inventive algorithm is simple, easy to operation, can quickly judge whether image occurs tampering detection, beneficial to copyright protection.

Description

Digital image tampering detection method with invisible watermark
Technical Field
The invention relates to a digital image watermarking technology, in particular to a digital image tampering detection method with an invisible watermark, and belongs to the technical field of image processing.
Background
With the development of multimedia technology, people use digital products such as images and videos more and more frequently, and the application fields of the digital products are wider and wider, so that the original identification and the falsification detection of pictures become a prominent problem.
Disclosure of Invention
The invention aims to provide a digital image tampering detection method with an invisible watermark, which can effectively detect whether a host image is tampered.
The technical scheme adopted by the invention is as follows: the digital image tampering detection method with the invisible watermark comprises the following steps:
the method comprises the following steps: carrying out invisible watermark encryption on the digital image: respectively representing the host image and the encrypted watermark image in a pixel matrix form, and embedding the pixel matrix of the encrypted watermark image into the host image through a watermark encryption algorithm;
step two: decoding the digital image with the invisible watermark: extracting a pixel matrix of a restored watermark image from a pixel matrix of a host image through a watermark decoding algorithm;
step three: comparing the encrypted watermark image with the restored watermark image: if the pixel matrix of the encrypted watermark image is equal to the pixel matrix of the restored watermark image, the host image is not tampered, otherwise, the host image is tampered.
The watermark encryption algorithm comprises the following steps:
1) respectively representing the host image and the encrypted watermark image in a pixel matrix form:
let the pixel matrix of the host image be composed of an arrangement of N rows and × M columns of sub-pixels, denoted ANM,ANMThe sub-pixel of the ith row and the jth column is marked as aij(ii) a Wherein i is more than or equal to 1 and less than or equal to N, j is more than or equal to 1 and less than or equal to M, and a is more than or equal to 0ij≤255;
Let the pixel matrix of the encrypted watermark image be composed of n rows and × m columns of sub-pixels, and be marked as Bnm,BnmThe sub-pixel of the middle s-th row and t-th column is marked as bst(ii) a Wherein s is more than or equal to 1 and less than or equal to n, t is more than or equal to 1 and less than or equal to m, and b is more than or equal to 0st≤255;
Wherein N is more than or equal to N, and M is more than or equal to 3M;
2) extraction of BnmSub-pixel hundredPosition, ten positions, unit position: let a sub-pixel bstThe hundred, ten and ones are marked as x, y and z respectively;
3) a is to beNMThe bit of the sub-pixel to be encrypted is zeroed: is selected from ANMThe sub-pixel with the row value not more than n and the column value not more than 3m is the sub-pixel to be encrypted, the bit of the sub-pixel to be encrypted is reset to zero, and the sub-pixel after the zero reset of the ith row and the jth column is used as a ″ijRepresents;
4) embedding the encrypted watermark image into the host image: a is to beNMThe encrypted sub-pixels in the ith row and the jth column are recorded as
Sub-pixel bstThe hundreds x and a ″)s(3t-2)Add, then
Sub-pixel bstThe ten positions y and a ″)s(3t-1)Add, then
Sub-pixel bstThe bits z and a ″)s(3t)Add, then
And so on until BnmIn which all sub-pixels are embedded in ANMIn (A)NMThe sub-pixels not subjected to the encryption processing are kept unchanged, thereby obtaining an encrypted image pixel matrix CNM
The watermark decoding algorithm comprises the following steps:
1) selecting CNMTwo elements of which the row value is n, the column value is 3m, the row value is 1 and the column value is 1The rectangular area determined by the elements as the vertexes is an area to be decoded;
2) in the area to be decoded, the area is sequentially arranged at C from left to right in a row unitNMTaking three sub-pixels, and extracting the single digit of the three sub-pixels: let a slave CNMThe three sub-pixels taken from the middle p-th row are respectivelyWherein,the ones digit of (a) is marked as x',the ones digit of (a) is noted as y',the ones number of (c) is denoted as z'; q represents the column value of the first subpixel taken by p rows;
3) multiplying the single digits of the three sub-pixels by 100, 10 and 1 respectively, summing up, and restoring to obtain a pixel matrix for restoring the watermark imageThe sub-pixel of (1): to representIn the p th line, the thThe sub-pixels of a column.
Compared with the prior art, the invention has the following beneficial effects: the digital image tampering detection method with the invisible watermark is simple in algorithm, simple and easy to operate, capable of rapidly judging whether the image is tampered and detected and beneficial to copyright protection; the influence on the visual effect of the original image is small by adjusting unimportant data; in addition, the method has small calculation amount and meets the real-time requirement.
Drawings
FIG. 1 is a flow chart of the operation of the present invention.
Detailed Description
The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
As shown in fig. 1, the digital image tampering detection method with invisible watermarks includes the following steps:
the method comprises the following steps: carrying out invisible watermark encryption on the digital image: the host image and the encrypted watermark image are respectively expressed in a pixel matrix form, and the pixel matrix of the encrypted watermark image is embedded into the host image through a watermark encryption algorithm.
The watermark encryption algorithm comprises the following steps:
1) respectively representing the host image and the encrypted watermark image in a pixel matrix form:
let the pixel matrix of the host image be composed of an arrangement of N rows and × M columns of sub-pixels, denoted ANM,ANMThe sub-pixel of the ith row and the jth column is marked as aij(ii) a Wherein i is more than or equal to 1 and less than or equal to N, j is more than or equal to 1 and less than or equal to M, and a is more than or equal to 0ij≤255;
Let the pixel matrix of the encrypted watermark image be composed of n rows and × m columns of sub-pixels, and be marked as Bnm,BnmThe sub-pixel of the middle s-th row and t-th column is marked as bst(ii) a Wherein s is more than or equal to 1 and less than or equal to n, t is more than or equal to 1 and less than or equal to m, and b is more than or equal to 0st≤255;
Wherein N is more than or equal to N, and M is more than or equal to 3M;
2) extraction of BnmHundred, ten, ones of the sub-pixels: let a sub-pixel bstThe hundred, ten and ones are marked as x, y and z respectively;
3) a is to beNMThe bit of the sub-pixel to be encrypted is zeroed: is selected from ANMThe sub-pixel with the row value not more than n and the column value not more than 3m is the sub-pixel to be encrypted, the bit of the sub-pixel to be encrypted is reset to zero, and the sub-pixel after the zero reset of the ith row and the jth column is used as a ″ijRepresents;
4) embedding the encrypted watermark image into the host image: a is to beNMThe encrypted sub-pixels in the ith row and the jth column are recorded as
Sub-pixel bstThe hundreds x and a ″)s(3t-2)Add, then
Sub-pixel bstThe ten positions y and a ″)s(3t-1)Add, then
Sub-pixel bstThe bits z and a ″)s(3t)Add, then
And so on until BnmIn which all sub-pixels are embedded in ANMIn (A)NMThe sub-pixels not subjected to the encryption processing are kept unchanged, thereby obtaining an encrypted image pixel matrix CNM
The above watermark encryption algorithm will now be further explained by way of example:the host image is represented in the form of a pixel matrix, assumed to be hypothesis ANMFor an 8 row 8 column matrix:
similarly, the encrypted watermark image is represented in the form of a pixel matrix, assuming BnmFor a 2 row 2 column matrix:
suppose a11=207,a12=143,a13=89,b11120, extracting b11Each of the hundred, ten and ones of (a) is represented by x, y and z, respectively, x is 1, y is 2, z is 0, and b11The corresponding sub-pixel to be encrypted is a11,a12,a13A is to11,a12,a13Zero to obtain a ″)11,a″12,a″13Then a ″)11=200,a″12=140,a″13X is then combined with a ″', 8011Add to obtainMixing y with a ″)12Add to obtainMixing z with a ″)13Add to obtainSame if a14=137,a15=123,a16=29,b12When it is 13, thenIf a21=47,a22=142,a23=189,b21246, thenIf a24=242,a25=172,a26=191,b22135, thenA8×8The sub-pixels not subjected to the encryption processing are kept unchanged, thereby obtaining an encrypted image pixel matrix C8×8
Step two: decoding the digital image with the invisible watermark: extracting a pixel matrix of a restored watermark image from a pixel matrix of a host image through a watermark decoding algorithm;
the watermark decoding algorithm comprises the following steps:
1) selecting CNMA rectangular area determined by taking two elements with the row value of n, the column value of 3m and the row value of 1 as vertexes as an area to be decoded;
2) in the area to be decoded, the area is sequentially arranged at C from left to right in a row unitNMTaking three sub-pixels, and extracting the single digit of the three sub-pixels: let a slave CNMThe three sub-pixels taken from the middle p-th row are respectivelyWherein,the ones digit of (a) is marked as x',the ones digit of (a) is noted as y',the ones number of (c) is denoted as z'; q represents the column value of the first subpixel taken by p rows;
3) multiplying the single digits of the three sub-pixels by 100, 10 and 1 respectively, summing up, and restoring to obtain a pixel matrix for restoring the watermark imageThe sub-pixel of (1): to representIn the p th line, the thThe sub-pixels of a column.
Now with the encrypted image pixel matrix C8×8For example, the following steps are carried out:
to C8×8Performing decoding operation to obtain pixel matrix B of known encrypted watermark imagenmIs a 2-row and 2-column matrix, i.e. n-m-2, C8×8The region with the middle row value not more than 2 and the column value not more than 6 is the region to be decoded, from C8×8Starting in the first row, from left to right 3 subpixels are taken in a group, the first group being: the ones number of (a) is noted as x' ═ 1,the ones number of (a) is noted as y' ═ 2,the ones number of (a) is noted as z' ═ 0;the second group is: the ones 'number of (a) is noted as x' ═ 0,the ones number of (a) is noted as y' ═ 1,the ones number of (a) is 3;after the first row decoding is finished, the second row decoding is continued to obtain Thereby obtaining a pixel matrix for restoring the watermark image
Step three: comparing the encrypted watermark image with the restored watermark image: if the pixel matrix of the encrypted watermark image is equal to the pixel matrix of the restored watermark image, the host image is not tampered, otherwise, the host image is not tamperedThe host-clear image is tampered. If B is2×2Andand if the two images are equal, the host image is not tampered, otherwise, the host image is tampered.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.

Claims (2)

1. The digital image tampering detection method with the invisible watermark is characterized by comprising the following steps:
the method comprises the following steps: carrying out invisible watermark encryption on the digital image: respectively representing the host image and the encrypted watermark image in a pixel matrix form, and embedding the pixel matrix of the encrypted watermark image into the host image through a watermark encryption algorithm;
the watermark encryption algorithm comprises the following steps:
1) respectively representing the host image and the encrypted watermark image in a pixel matrix form:
let the pixel matrix of the host image be composed of an arrangement of N rows and × M columns of sub-pixels, denoted ANM,ANMThe sub-pixel of the ith row and the jth column is marked as aij(ii) a Wherein i is more than or equal to 1 and less than or equal to N, j is more than or equal to 1 and less than or equal to M, and a is more than or equal to 0ij≤255;
Let the pixel matrix of the encrypted watermark image be composed of n rows and × m columns of sub-pixels, and be marked as Bnm,BnmThe sub-pixel of the middle s-th row and t-th column is marked as bst(ii) a Wherein s is more than or equal to 1 and less than or equal to n, t is more than or equal to 1 and less than or equal to m, and b is more than or equal to 0st≤255;
Wherein N is more than or equal to N, and M is more than or equal to 3M;
2) extraction of BnmHundred, ten, ones of the sub-pixels: let a sub-pixel bstThe hundred, ten and ones are marked as x, y and z respectively;
3) a is to beNMThe bit of the sub-pixel to be encrypted is zeroed: is selected from ANMThe sub-pixel with the row value not more than n and the column value not more than 3m is the sub-pixel to be encrypted, the bit of the sub-pixel to be encrypted is reset to zero, and the sub-pixel after the zero reset of the ith row and the jth column is used as a ″ijRepresents;
4) embedding the encrypted watermark image into the host image: a is to beNMThe encrypted sub-pixels in the ith row and the jth column are recorded as
Sub-pixel bstThe hundreds x and a ″)s(3t-2)Add, then
Sub-pixel bstThe ten positions y and a ″)s(3t-1)Add, then
Sub-pixel bstThe bits z and a ″)s(3t)Add, then
And so on until BnmIn which all sub-pixels are embedded in ANMIn (A)NMThe sub-pixels not subjected to the encryption processing are kept unchanged, thereby obtaining an encrypted image pixel matrix CNM
Step two: decoding the digital image with the invisible watermark: extracting a pixel matrix of a restored watermark image from a pixel matrix of a host image through a watermark decoding algorithm;
step three: comparing the encrypted watermark image with the restored watermark image: if the pixel matrix of the encrypted watermark image is equal to the pixel matrix of the restored watermark image, the host image is not tampered, otherwise, the host image is tampered.
2. The tamper detection method for digital images with invisible watermarks according to claim 1, wherein said watermark decoding algorithm comprises the steps of:
1) selecting CNMA rectangular area determined by taking two elements with the row value of n, the column value of 3m and the row value of 1 as vertexes as an area to be decoded;
2) in the area to be decoded, the area is sequentially arranged at C from left to right in a row unitNMTaking three sub-pixels, and extracting the single digit of the three sub-pixels: let a slave CNMThe three sub-pixels taken from the middle p-th row are respectivelyWherein,the ones digit of (a) is marked as x',the ones digit of (a) is noted as y',the ones number of (c) is denoted as z'; q represents a p-line instituteTaking the column value of the first sub-pixel;
3) multiplying the single digits of the three sub-pixels by 100, 10 and 1 respectively, summing up, and restoring to obtain a pixel matrix for restoring the watermark imageThe sub-pixel of (1): to representIn the p th line, the thThe sub-pixels of a column.
CN201410217258.7A 2014-05-21 2014-05-21 Digital image tampering detection method with stealthy watermark Active CN103985079B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410217258.7A CN103985079B (en) 2014-05-21 2014-05-21 Digital image tampering detection method with stealthy watermark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410217258.7A CN103985079B (en) 2014-05-21 2014-05-21 Digital image tampering detection method with stealthy watermark

Publications (2)

Publication Number Publication Date
CN103985079A CN103985079A (en) 2014-08-13
CN103985079B true CN103985079B (en) 2017-03-29

Family

ID=51277037

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410217258.7A Active CN103985079B (en) 2014-05-21 2014-05-21 Digital image tampering detection method with stealthy watermark

Country Status (1)

Country Link
CN (1) CN103985079B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110569627B (en) * 2019-08-01 2021-08-20 北京大米科技有限公司 Image processing method and device and electronic equipment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1930868A (en) * 2004-03-29 2007-03-14 冲电气工业株式会社 Printing medium quality adjusting system, examining watermark medium output device, watermark quality examining device, adjusted watermark medium output device, printing medium quality adjusting metho
CN100461214C (en) * 2007-07-26 2009-02-11 北京交通大学 Image authentication method based on feedback chaos system and neighborhood assistance
CN101582158B (en) * 2009-06-26 2011-12-07 中山大学 Method for embedding and authenticating watermark of digital image
CN102024245B (en) * 2009-09-10 2013-03-27 广州市百成科技有限公司 Fragile watermarking technology-based electronic seal protection method
CN103106636A (en) * 2013-02-28 2013-05-15 大连民族学院 Gray image watermark embedding and extracting method based on singular value decomposition

Also Published As

Publication number Publication date
CN103985079A (en) 2014-08-13

Similar Documents

Publication Publication Date Title
US9443277B2 (en) Method for embedding and extracting multi-scale space based watermark
CN108537049B (en) Adaptive steganography algorithm based on binary image
Abu-Marie et al. Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator.
Pan et al. Image steganography method based on PVD and modulus function
CN105488434B (en) A kind of map vector completeness certification method based on label
CN101604439A (en) A kind of color image encrypting method based on multi-chaos system
Singh et al. A self recoverable dual watermarking scheme for copyright protection and integrity verification
Wu et al. SVD-based self-embedding image authentication scheme using quick response code features
CN101916427A (en) Spatial domain-based image watermark adding method
Nilizadeh et al. Information Hiding in RGB Images Using an Improved Matrix Pattern Approach.
Gong et al. Steganalysis for GIF images based on colors-gradient co-occurrence matrix
Tang et al. An end-to-end screen shooting resilient blind watermarking scheme for medical images
CN104156909B (en) The robust reversible watermark insertion of image content-based and detection method
CN103093127A (en) Method and system of dynamic copyright protection based on sudoku and multiple digital watermarks
CN109829890A (en) A kind of jpeg image vector safety evaluation method
Cui et al. Research on region selection strategy for visible watermark embedding
CN103810668A (en) Double color image blind watermarking method based on singular value decomposition
CN103985079B (en) Digital image tampering detection method with stealthy watermark
Su et al. A robust color image watermarking scheme in the fusion domain based on LU factorization
CN109544438A (en) A kind of digital watermark method based on neural network and dct transform
CN106228503B (en) The digital watermark embedding and extracting method of satellite remote-sensing image SHP dot files
Kumar et al. Data hiding with dual based reversible image using sudoku technique
CN101950406B (en) Transform domain-based image water mark adding method
CN106599727A (en) Vector map integrity authentication method
CN103491456B (en) A kind of robust video watermark process of resist geometric attacks based on SIFT

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20191204

Address after: Room 1,020, Nanxun Science and Technology Pioneering Park, No. 666 Chaoyang Road, Nanxun District, Huzhou City, Zhejiang Province, 313000

Patentee after: Huzhou You Yan Intellectual Property Service Co., Ltd.

Address before: The stone of Baixia District of Nanjing city in Jiangsu province 210000 Yang Road No. 56 Baixia high-tech industrial park business park A District No. 3 building 132 room

Patentee before: Nanjing Yin Mowei Electronic Science and Technology Co., Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201211

Address after: Room 074, Room 301, 3rd floor, No.70, Haidian West Street, Haidian District, Beijing 100089

Patentee after: Beijing chain growth Technology Co.,Ltd.

Address before: 313000 room 1020, science and Technology Pioneer Park, 666 Chaoyang Road, Nanxun Town, Nanxun District, Huzhou, Zhejiang.

Patentee before: Huzhou You Yan Intellectual Property Service Co.,Ltd.

TR01 Transfer of patent right