CN104268822A - Anti-fake authentication method for uploaded network picture - Google Patents

Anti-fake authentication method for uploaded network picture Download PDF

Info

Publication number
CN104268822A
CN104268822A CN201410478464.3A CN201410478464A CN104268822A CN 104268822 A CN104268822 A CN 104268822A CN 201410478464 A CN201410478464 A CN 201410478464A CN 104268822 A CN104268822 A CN 104268822A
Authority
CN
China
Prior art keywords
uploaded
image
carries out
watermark
discrete cosine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410478464.3A
Other languages
Chinese (zh)
Inventor
包观笑
孙刘杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Shanghai for Science and Technology
Original Assignee
University of Shanghai for Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Shanghai for Science and Technology filed Critical University of Shanghai for Science and Technology
Priority to CN201410478464.3A priority Critical patent/CN104268822A/en
Publication of CN104268822A publication Critical patent/CN104268822A/en
Pending legal-status Critical Current

Links

Abstract

The invention provides an anti-fake authentication method for an uploaded network picture. The anti-fake authentication method for the uploaded network picture is characterized by comprising the following steps that (1) a grayscale image of a B component of the picture, to be uploaded, in the RGB format is extracted; (2) Randon conversion is conducted on the grayscale image, and the grayscale image is corrected and rotated by a certain angle; (3) disperse cosine inverse transformation is conducted on the corrected grayscale image, and a QR code is extracted; (4) whether QR code watermark information exists in the picture to be uploaded is judged, if yes, the unsuccessful uploading prompt is given out, and if not, the step (5) is executed; (5) the picture, to be uploaded, containing no watermark information is encrypted.

Description

The anti-counterfeiting authentication method of network upload images
Technical field
The anti-counterfeiting authentication method when network image that the present invention relates to based on light holographic watermark and QR code is uploaded.
Background technology
Along with developing rapidly of electric business, shopping at network has almost become main flow.But the pirate reprint phenomenon of cyber picture is serious, the antitheft major issue being current electric business and facing of commodity picture.Digital watermark anti-fake technology has good invisibility, and watermark detection is simple and convenient, and with low cost, diversification of forms, is therefore applicable to very much being applied to the antitheft of cyber.
Light holographic technique can record light intensity and the phase information of object, is the most applicable generally acknowledged technology being applied to watermarking algorithm.But existing smooth holographic watermark technology is suffering geometric attack, during as attacks such as rotating, cut, the watermarking information loss extracted is larger.
Summary of the invention
The present invention be directed to that the problems referred to above carry out, object is the anti-counterfeiting authentication method providing a kind of network upload images, cut to meet target image, rotation etc. extracts the sane requirement of watermark after attacking.
The present invention for achieving the above object, have employed following technical scheme:
The invention provides a kind of anti-counterfeiting authentication method of network upload images, it is characterized in that, comprise the following steps: step 1, extract the gray level image of the B component of the image to be uploaded of rgb format; Step 2, carries out Randon conversion to gray level image, corrects the anglec of rotation; Step 3, carries out inverse discrete cosine transform to the gray level image after step 2 corrects, extracts QR code; Step 4, judges whether image to be uploaded exists QR code watermark information, if image to be uploaded contains watermark information, failure is uploaded in prompting, if image to be uploaded is not with watermarked information, carries out next step; And step 5, to the image to be uploaded not containing watermark information, carry out the encryption of upload images, wherein, the encryption of above-mentioned upload images comprises the following steps: step 5-1, author information is generated QR code, as watermarking images A (x, y); Step 5-2, generates random-phase marks ξ (x, y); Step 5-3, carries out the modulation of random-phase marks ξ (x, y) to watermarking images A (x, y), then carry out discrete cosine transform, generates discrete cosine transform holographic watermark image; Step 5-4, reads image to be uploaded, carries out discrete cosine transform to B component; Step 5-5, embeds the B component after discrete cosine transform by discrete cosine transform holographic watermark image, then carries out inverse discrete cosine transform; And step 5-6, the B component after the inverse discrete cosine transform obtained by step 5-5 and R, G component of image to be uploaded merge, and obtain the upload images of embed watermark, the upload images of this embed watermark is uploaded to the webserver.
The effect of invention and effect
According to the anti-counterfeiting authentication method of network upload images provided by the present invention, because use Randon conversion to solve the Rotation of image when extracting watermark, failure is uploaded for the picture cues containing watermark information, and for the master image not containing watermark information, author information is generated QR code, utilize watermark to record the information of author, then holographic watermark image is generated by discrete cosine transform (DCT), embed in image to be uploaded and carry out copyright protection, therefore this anti-counterfeiting authentication method is very suitable for copyright protection and the certification of network upload images, watermark embedding method substantially increases the anti-ability of cutting of watermark, reduce the data redundancy of watermarking images, eliminate conventional photographic watermarking algorithm and there is the problem of being inverted conjugated image.In addition, embedded by watermark information in the DCT frequency domain of the B component of image to be uploaded, then by the image of R, G, B component of image to be uploaded synthesis embed watermark, therefore this watermark has invisibility.
Accompanying drawing explanation
Fig. 1 is the algorithm flow chart of the anti-counterfeiting authentication method of network upload images of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the anti-counterfeiting authentication method of network upload images provided by the present invention is elaborated.
Fig. 1 is the algorithm flow chart of the anti-counterfeiting authentication method of network upload images of the present invention.
The anti-counterfeiting authentication method of network upload images comprises the following steps:
Step S-1, reads image to be uploaded, extracts the gray level image of the B component of this image to be uploaded.
Step S-2, carries out Randon conversion to the gray level image of B component, correct tilt angle.
Step S-3, carries out DCT inverse transformation to the gray level image of the B component after correction, extracts QR code.
Step S-4, decodes to QR code, judges whether image to be uploaded exists QR code watermark information.If existed, then upload failure, prompting is uploaded not containing the image of watermark; If there is no, then next step is carried out.
Step S-5, for the image to be uploaded not containing watermark information, carries out the encryption of upload images.
The encryption of upload images comprises the following steps:
Step S-5-1, is processed into QR code image as watermarking images A (x, y) using author information.
Step S-5-2, generates random-phase marks ξ (x, y).
Step S-5-3, reads above-mentioned watermarking images A (x, y), carries out random phase ξ (x, y) modulation, then carries out dct transform, generates DCT holographic watermark image.
Step S-5-4, reads image to be uploaded, extracts the gray level image of B component, carries out dct transform to the gray level image of B component.
Step S-5-5, embeds the B component gray level image after dct transform by DCT holographic watermark image, then carries out DCT inverse transformation.
Step S-5-6, merges the R component of the B component gray level image after DCT inverse transformation and image to be uploaded and G component, obtains the upload images of embed watermark, uploaded onto the server by the upload images of this embed watermark.
The effect of embodiment and effect
According to the anti-counterfeiting authentication method of the network upload images that the present embodiment provides, because first use Randon conversion to correct the anglec of rotation, then DCT inverse transformation is just had to extract watermark information, failure is uploaded to the picture cues containing watermark information, and for the master image not containing watermarking images, the QR code generated by author information embeds in the DCT frequency domain of image B component to be uploaded after generating DCT holographic watermark image, then by R, G, B component obtains coloured image after merging, therefore the method can carry out copyright authentication when network upload images, master image embed watermark not containing watermark information is encrypted, then upload onto the server.
In addition because in the DCT frequency domain of image to be uploaded embed watermark, watermark information can be made to be distributed in each pixel of image to be uploaded, therefore substantially increase the anti-ability of cutting and the robustness of watermark, and this watermark to have invisibility.
Certainly, the anti-counterfeiting authentication method of network upload images provided by the present invention, is not merely defined in the content described in above embodiment.These are only the present invention conceive under basic explanation, and according to any equivalent transformation that technical scheme of the present invention is done, all should protection scope of the present invention be belonged to.

Claims (1)

1. an anti-counterfeiting authentication method for network upload images, is characterized in that, comprises the following steps:
Step 1, extracts the gray level image of the B component of the image to be uploaded of rgb format;
Step 2, carries out Randon conversion to described gray level image, corrects the anglec of rotation;
Step 3, carries out inverse discrete cosine transform to the gray level image after described step 2 corrects, extracts QR code;
Step 4, judges whether described image to be uploaded exists QR code watermark information, if described image to be uploaded contains watermark information, failure is uploaded in prompting, if described image to be uploaded is not with watermarked information, carries out next step; And
Step 5, to the image described to be uploaded not containing watermark information, carries out the encryption of upload images,
Wherein, the encryption of described upload images comprises the following steps:
Step 5-1, generates QR code by author information, as watermarking images A (x, y);
Step 5-2, generates random-phase marks ξ (x, y);
Step 5-3, carries out the modulation of described random-phase marks ξ (x, y), then carries out discrete cosine transform to described watermarking images A (x, y), generate discrete cosine transform holographic watermark image;
Step 5-4, reads described image to be uploaded, carries out discrete cosine transform to B component;
Step 5-5, embeds the B component after described discrete cosine transform by described discrete cosine transform holographic watermark image, then carries out inverse discrete cosine transform; And
Step 5-6, R, G component of the B component after the inverse discrete cosine transform obtain described step 5-5 and described image to be uploaded merges, and obtains the upload images of embed watermark, and the upload images of this embed watermark is uploaded to the webserver.
CN201410478464.3A 2014-09-18 2014-09-18 Anti-fake authentication method for uploaded network picture Pending CN104268822A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410478464.3A CN104268822A (en) 2014-09-18 2014-09-18 Anti-fake authentication method for uploaded network picture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410478464.3A CN104268822A (en) 2014-09-18 2014-09-18 Anti-fake authentication method for uploaded network picture

Publications (1)

Publication Number Publication Date
CN104268822A true CN104268822A (en) 2015-01-07

Family

ID=52160342

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410478464.3A Pending CN104268822A (en) 2014-09-18 2014-09-18 Anti-fake authentication method for uploaded network picture

Country Status (1)

Country Link
CN (1) CN104268822A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104820968A (en) * 2015-04-22 2015-08-05 上海理工大学 Text draft angle correction method
CN105471904A (en) * 2015-12-29 2016-04-06 深圳市瑞铭无限科技有限公司 Safety verification method and device for uploading picture
WO2017124940A1 (en) * 2016-01-21 2017-07-27 腾讯科技(深圳)有限公司 Method and device for recognizing whether image comprises watermark
CN111259387A (en) * 2018-12-03 2020-06-09 上海掌门科技有限公司 Method and device for detecting tampered application

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236882A (en) * 2011-07-21 2011-11-09 上海理工大学 Encrypted holographic watermark algorithm of transform domain based on copyright protection
CN102592257A (en) * 2012-01-04 2012-07-18 上海理工大学 Cyan, magenta, yellow and black (CMYK) color space-based optical holographic watermark algorithm

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236882A (en) * 2011-07-21 2011-11-09 上海理工大学 Encrypted holographic watermark algorithm of transform domain based on copyright protection
CN102592257A (en) * 2012-01-04 2012-07-18 上海理工大学 Cyan, magenta, yellow and black (CMYK) color space-based optical holographic watermark algorithm

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
XIAOJIE LI .ETC: ""DCT domain filtering method for multi-antenna code acquisition"", 《JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS》 *
周中原 等: ""一种抗旋转的全息水印算法"", 《包装工程》 *
李晨璐 等: ""一种新的彩色图像变换域全息水印算法"", 《包装工程》 *
王子煜 等: ""强鲁棒性QR码水印技术"", 《包装工程》 *
陈大庆 等: ""基于相位恢复的傅里叶变换全息图像数字水印"", 《光学学报》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104820968A (en) * 2015-04-22 2015-08-05 上海理工大学 Text draft angle correction method
CN105471904A (en) * 2015-12-29 2016-04-06 深圳市瑞铭无限科技有限公司 Safety verification method and device for uploading picture
WO2017124940A1 (en) * 2016-01-21 2017-07-27 腾讯科技(深圳)有限公司 Method and device for recognizing whether image comprises watermark
US10504202B2 (en) 2016-01-21 2019-12-10 Tencent Technology (Shenzhen) Company Limited Method and device for identifying whether standard picture contains watermark
CN111259387A (en) * 2018-12-03 2020-06-09 上海掌门科技有限公司 Method and device for detecting tampered application
CN111259387B (en) * 2018-12-03 2021-06-15 上海掌门科技有限公司 Method and device for detecting tampered application

Similar Documents

Publication Publication Date Title
Liu et al. Blind dual watermarking for color images’ authentication and copyright protection
US7206432B2 (en) Extracting embedded information from digital image data
Liu et al. Generic lossless visible watermarking—a new approach
Deguillaume et al. Secure hybrid robust watermarking resistant against tampering and copy attack
Kang et al. Efficient general print-scanning resilient data hiding based on uniform log-polar mapping
US6788800B1 (en) Authenticating objects using embedded data
Barni et al. Digital watermarking
US20030070075A1 (en) Secure hybrid robust watermarking resistant against tampering and copy-attack
KR101744744B1 (en) System for tracking illegal distributeur and preventing distribution of illegal content and method thereof
CN103996166A (en) Holographic anti-counterfeiting algorithm based on shape of screen dot
CN105701757B (en) Product anti-counterfeiting method and device based on digital watermark and graphic code
Celik et al. Collusion-resilient fingerprinting by random pre-warping
CN104268822A (en) Anti-fake authentication method for uploaded network picture
CN104217392A (en) Holographic watermark algorithm resistant to geometric attack
Liu et al. Image authentication using QR code watermarking approach based on image segmentation
CN102946531A (en) GOP (group of picture) frame structure combined video watermarking method and system
Kim et al. Watermark with DSA signature using predictive coding
CN110189241B (en) Block mean value-based anti-printing noise image watermarking method
Bhattacharyya et al. Watermarking Using Multiresolution Cosine Transformation: A Review
Mursi et al. A DCT-based secure JPEG image authentication scheme
Uludag et al. Robust watermarking of busy images
Genov Digital watermarking of bitmap images
Jiang et al. Semi-fragile watermarking algorithm for image tampers localization and recovery
Kumar et al. Lossless Visible Watermarking Using Compound Mapping
Zhang et al. Invertibility attack against watermarking based on forged algorithm and a countermeasure

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150107

RJ01 Rejection of invention patent application after publication