CN104268822A - Anti-fake authentication method for uploaded network picture - Google Patents
Anti-fake authentication method for uploaded network picture Download PDFInfo
- Publication number
- CN104268822A CN104268822A CN201410478464.3A CN201410478464A CN104268822A CN 104268822 A CN104268822 A CN 104268822A CN 201410478464 A CN201410478464 A CN 201410478464A CN 104268822 A CN104268822 A CN 104268822A
- Authority
- CN
- China
- Prior art keywords
- uploaded
- image
- carries out
- watermark
- discrete cosine
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention provides an anti-fake authentication method for an uploaded network picture. The anti-fake authentication method for the uploaded network picture is characterized by comprising the following steps that (1) a grayscale image of a B component of the picture, to be uploaded, in the RGB format is extracted; (2) Randon conversion is conducted on the grayscale image, and the grayscale image is corrected and rotated by a certain angle; (3) disperse cosine inverse transformation is conducted on the corrected grayscale image, and a QR code is extracted; (4) whether QR code watermark information exists in the picture to be uploaded is judged, if yes, the unsuccessful uploading prompt is given out, and if not, the step (5) is executed; (5) the picture, to be uploaded, containing no watermark information is encrypted.
Description
Technical field
The anti-counterfeiting authentication method when network image that the present invention relates to based on light holographic watermark and QR code is uploaded.
Background technology
Along with developing rapidly of electric business, shopping at network has almost become main flow.But the pirate reprint phenomenon of cyber picture is serious, the antitheft major issue being current electric business and facing of commodity picture.Digital watermark anti-fake technology has good invisibility, and watermark detection is simple and convenient, and with low cost, diversification of forms, is therefore applicable to very much being applied to the antitheft of cyber.
Light holographic technique can record light intensity and the phase information of object, is the most applicable generally acknowledged technology being applied to watermarking algorithm.But existing smooth holographic watermark technology is suffering geometric attack, during as attacks such as rotating, cut, the watermarking information loss extracted is larger.
Summary of the invention
The present invention be directed to that the problems referred to above carry out, object is the anti-counterfeiting authentication method providing a kind of network upload images, cut to meet target image, rotation etc. extracts the sane requirement of watermark after attacking.
The present invention for achieving the above object, have employed following technical scheme:
The invention provides a kind of anti-counterfeiting authentication method of network upload images, it is characterized in that, comprise the following steps: step 1, extract the gray level image of the B component of the image to be uploaded of rgb format; Step 2, carries out Randon conversion to gray level image, corrects the anglec of rotation; Step 3, carries out inverse discrete cosine transform to the gray level image after step 2 corrects, extracts QR code; Step 4, judges whether image to be uploaded exists QR code watermark information, if image to be uploaded contains watermark information, failure is uploaded in prompting, if image to be uploaded is not with watermarked information, carries out next step; And step 5, to the image to be uploaded not containing watermark information, carry out the encryption of upload images, wherein, the encryption of above-mentioned upload images comprises the following steps: step 5-1, author information is generated QR code, as watermarking images A (x, y); Step 5-2, generates random-phase marks ξ (x, y); Step 5-3, carries out the modulation of random-phase marks ξ (x, y) to watermarking images A (x, y), then carry out discrete cosine transform, generates discrete cosine transform holographic watermark image; Step 5-4, reads image to be uploaded, carries out discrete cosine transform to B component; Step 5-5, embeds the B component after discrete cosine transform by discrete cosine transform holographic watermark image, then carries out inverse discrete cosine transform; And step 5-6, the B component after the inverse discrete cosine transform obtained by step 5-5 and R, G component of image to be uploaded merge, and obtain the upload images of embed watermark, the upload images of this embed watermark is uploaded to the webserver.
The effect of invention and effect
According to the anti-counterfeiting authentication method of network upload images provided by the present invention, because use Randon conversion to solve the Rotation of image when extracting watermark, failure is uploaded for the picture cues containing watermark information, and for the master image not containing watermark information, author information is generated QR code, utilize watermark to record the information of author, then holographic watermark image is generated by discrete cosine transform (DCT), embed in image to be uploaded and carry out copyright protection, therefore this anti-counterfeiting authentication method is very suitable for copyright protection and the certification of network upload images, watermark embedding method substantially increases the anti-ability of cutting of watermark, reduce the data redundancy of watermarking images, eliminate conventional photographic watermarking algorithm and there is the problem of being inverted conjugated image.In addition, embedded by watermark information in the DCT frequency domain of the B component of image to be uploaded, then by the image of R, G, B component of image to be uploaded synthesis embed watermark, therefore this watermark has invisibility.
Accompanying drawing explanation
Fig. 1 is the algorithm flow chart of the anti-counterfeiting authentication method of network upload images of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the anti-counterfeiting authentication method of network upload images provided by the present invention is elaborated.
Fig. 1 is the algorithm flow chart of the anti-counterfeiting authentication method of network upload images of the present invention.
The anti-counterfeiting authentication method of network upload images comprises the following steps:
Step S-1, reads image to be uploaded, extracts the gray level image of the B component of this image to be uploaded.
Step S-2, carries out Randon conversion to the gray level image of B component, correct tilt angle.
Step S-3, carries out DCT inverse transformation to the gray level image of the B component after correction, extracts QR code.
Step S-4, decodes to QR code, judges whether image to be uploaded exists QR code watermark information.If existed, then upload failure, prompting is uploaded not containing the image of watermark; If there is no, then next step is carried out.
Step S-5, for the image to be uploaded not containing watermark information, carries out the encryption of upload images.
The encryption of upload images comprises the following steps:
Step S-5-1, is processed into QR code image as watermarking images A (x, y) using author information.
Step S-5-2, generates random-phase marks ξ (x, y).
Step S-5-3, reads above-mentioned watermarking images A (x, y), carries out random phase ξ (x, y) modulation, then carries out dct transform, generates DCT holographic watermark image.
Step S-5-4, reads image to be uploaded, extracts the gray level image of B component, carries out dct transform to the gray level image of B component.
Step S-5-5, embeds the B component gray level image after dct transform by DCT holographic watermark image, then carries out DCT inverse transformation.
Step S-5-6, merges the R component of the B component gray level image after DCT inverse transformation and image to be uploaded and G component, obtains the upload images of embed watermark, uploaded onto the server by the upload images of this embed watermark.
The effect of embodiment and effect
According to the anti-counterfeiting authentication method of the network upload images that the present embodiment provides, because first use Randon conversion to correct the anglec of rotation, then DCT inverse transformation is just had to extract watermark information, failure is uploaded to the picture cues containing watermark information, and for the master image not containing watermarking images, the QR code generated by author information embeds in the DCT frequency domain of image B component to be uploaded after generating DCT holographic watermark image, then by R, G, B component obtains coloured image after merging, therefore the method can carry out copyright authentication when network upload images, master image embed watermark not containing watermark information is encrypted, then upload onto the server.
In addition because in the DCT frequency domain of image to be uploaded embed watermark, watermark information can be made to be distributed in each pixel of image to be uploaded, therefore substantially increase the anti-ability of cutting and the robustness of watermark, and this watermark to have invisibility.
Certainly, the anti-counterfeiting authentication method of network upload images provided by the present invention, is not merely defined in the content described in above embodiment.These are only the present invention conceive under basic explanation, and according to any equivalent transformation that technical scheme of the present invention is done, all should protection scope of the present invention be belonged to.
Claims (1)
1. an anti-counterfeiting authentication method for network upload images, is characterized in that, comprises the following steps:
Step 1, extracts the gray level image of the B component of the image to be uploaded of rgb format;
Step 2, carries out Randon conversion to described gray level image, corrects the anglec of rotation;
Step 3, carries out inverse discrete cosine transform to the gray level image after described step 2 corrects, extracts QR code;
Step 4, judges whether described image to be uploaded exists QR code watermark information, if described image to be uploaded contains watermark information, failure is uploaded in prompting, if described image to be uploaded is not with watermarked information, carries out next step; And
Step 5, to the image described to be uploaded not containing watermark information, carries out the encryption of upload images,
Wherein, the encryption of described upload images comprises the following steps:
Step 5-1, generates QR code by author information, as watermarking images A (x, y);
Step 5-2, generates random-phase marks ξ (x, y);
Step 5-3, carries out the modulation of described random-phase marks ξ (x, y), then carries out discrete cosine transform to described watermarking images A (x, y), generate discrete cosine transform holographic watermark image;
Step 5-4, reads described image to be uploaded, carries out discrete cosine transform to B component;
Step 5-5, embeds the B component after described discrete cosine transform by described discrete cosine transform holographic watermark image, then carries out inverse discrete cosine transform; And
Step 5-6, R, G component of the B component after the inverse discrete cosine transform obtain described step 5-5 and described image to be uploaded merges, and obtains the upload images of embed watermark, and the upload images of this embed watermark is uploaded to the webserver.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410478464.3A CN104268822A (en) | 2014-09-18 | 2014-09-18 | Anti-fake authentication method for uploaded network picture |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410478464.3A CN104268822A (en) | 2014-09-18 | 2014-09-18 | Anti-fake authentication method for uploaded network picture |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104268822A true CN104268822A (en) | 2015-01-07 |
Family
ID=52160342
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410478464.3A Pending CN104268822A (en) | 2014-09-18 | 2014-09-18 | Anti-fake authentication method for uploaded network picture |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104268822A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104820968A (en) * | 2015-04-22 | 2015-08-05 | 上海理工大学 | Text draft angle correction method |
CN105471904A (en) * | 2015-12-29 | 2016-04-06 | 深圳市瑞铭无限科技有限公司 | Safety verification method and device for uploading picture |
WO2017124940A1 (en) * | 2016-01-21 | 2017-07-27 | 腾讯科技(深圳)有限公司 | Method and device for recognizing whether image comprises watermark |
CN111259387A (en) * | 2018-12-03 | 2020-06-09 | 上海掌门科技有限公司 | Method and device for detecting tampered application |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102236882A (en) * | 2011-07-21 | 2011-11-09 | 上海理工大学 | Encrypted holographic watermark algorithm of transform domain based on copyright protection |
CN102592257A (en) * | 2012-01-04 | 2012-07-18 | 上海理工大学 | Cyan, magenta, yellow and black (CMYK) color space-based optical holographic watermark algorithm |
-
2014
- 2014-09-18 CN CN201410478464.3A patent/CN104268822A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102236882A (en) * | 2011-07-21 | 2011-11-09 | 上海理工大学 | Encrypted holographic watermark algorithm of transform domain based on copyright protection |
CN102592257A (en) * | 2012-01-04 | 2012-07-18 | 上海理工大学 | Cyan, magenta, yellow and black (CMYK) color space-based optical holographic watermark algorithm |
Non-Patent Citations (5)
Title |
---|
XIAOJIE LI .ETC: ""DCT domain filtering method for multi-antenna code acquisition"", 《JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS》 * |
周中原 等: ""一种抗旋转的全息水印算法"", 《包装工程》 * |
李晨璐 等: ""一种新的彩色图像变换域全息水印算法"", 《包装工程》 * |
王子煜 等: ""强鲁棒性QR码水印技术"", 《包装工程》 * |
陈大庆 等: ""基于相位恢复的傅里叶变换全息图像数字水印"", 《光学学报》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104820968A (en) * | 2015-04-22 | 2015-08-05 | 上海理工大学 | Text draft angle correction method |
CN105471904A (en) * | 2015-12-29 | 2016-04-06 | 深圳市瑞铭无限科技有限公司 | Safety verification method and device for uploading picture |
WO2017124940A1 (en) * | 2016-01-21 | 2017-07-27 | 腾讯科技(深圳)有限公司 | Method and device for recognizing whether image comprises watermark |
US10504202B2 (en) | 2016-01-21 | 2019-12-10 | Tencent Technology (Shenzhen) Company Limited | Method and device for identifying whether standard picture contains watermark |
CN111259387A (en) * | 2018-12-03 | 2020-06-09 | 上海掌门科技有限公司 | Method and device for detecting tampered application |
CN111259387B (en) * | 2018-12-03 | 2021-06-15 | 上海掌门科技有限公司 | Method and device for detecting tampered application |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | Blind dual watermarking for color images’ authentication and copyright protection | |
US7206432B2 (en) | Extracting embedded information from digital image data | |
Liu et al. | Generic lossless visible watermarking—a new approach | |
Deguillaume et al. | Secure hybrid robust watermarking resistant against tampering and copy attack | |
Kang et al. | Efficient general print-scanning resilient data hiding based on uniform log-polar mapping | |
US6788800B1 (en) | Authenticating objects using embedded data | |
Barni et al. | Digital watermarking | |
US20030070075A1 (en) | Secure hybrid robust watermarking resistant against tampering and copy-attack | |
KR101744744B1 (en) | System for tracking illegal distributeur and preventing distribution of illegal content and method thereof | |
CN103996166A (en) | Holographic anti-counterfeiting algorithm based on shape of screen dot | |
CN105701757B (en) | Product anti-counterfeiting method and device based on digital watermark and graphic code | |
Celik et al. | Collusion-resilient fingerprinting by random pre-warping | |
CN104268822A (en) | Anti-fake authentication method for uploaded network picture | |
CN104217392A (en) | Holographic watermark algorithm resistant to geometric attack | |
Liu et al. | Image authentication using QR code watermarking approach based on image segmentation | |
CN102946531A (en) | GOP (group of picture) frame structure combined video watermarking method and system | |
Kim et al. | Watermark with DSA signature using predictive coding | |
CN110189241B (en) | Block mean value-based anti-printing noise image watermarking method | |
Bhattacharyya et al. | Watermarking Using Multiresolution Cosine Transformation: A Review | |
Mursi et al. | A DCT-based secure JPEG image authentication scheme | |
Uludag et al. | Robust watermarking of busy images | |
Genov | Digital watermarking of bitmap images | |
Jiang et al. | Semi-fragile watermarking algorithm for image tampers localization and recovery | |
Kumar et al. | Lossless Visible Watermarking Using Compound Mapping | |
Zhang et al. | Invertibility attack against watermarking based on forged algorithm and a countermeasure |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150107 |
|
RJ01 | Rejection of invention patent application after publication |