CN104484587A - Mobile phone photographing authentication method - Google Patents
Mobile phone photographing authentication method Download PDFInfo
- Publication number
- CN104484587A CN104484587A CN201410770700.9A CN201410770700A CN104484587A CN 104484587 A CN104484587 A CN 104484587A CN 201410770700 A CN201410770700 A CN 201410770700A CN 104484587 A CN104484587 A CN 104484587A
- Authority
- CN
- China
- Prior art keywords
- image
- signature
- watermark
- authentication
- generation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 59
- 230000000739 chaotic effect Effects 0.000 claims abstract description 4
- 238000000605 extraction Methods 0.000 claims abstract description 4
- 238000012795 verification Methods 0.000 claims description 8
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 abstract 1
- 238000002203 pretreatment Methods 0.000 abstract 1
- 239000000284 extract Substances 0.000 description 4
- 230000009466 transformation Effects 0.000 description 3
- 230000000052 comparative effect Effects 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000003909 pattern recognition Methods 0.000 description 1
- 230000017105 transposition Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1063—Personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0042—Fragile watermarking, e.g. so as to detect tampering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0065—Extraction of an embedded watermark; Reliable detection
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention provides a mobile phone photographing authentication method, and belongs to the technical field of digital image processing. The mobile phone photographing authentication method provided by the invention comprises a signature process and an authentication process. The signature process realizes the signature function of embedding authentication information such as watermark in the image. The signature process mainly comprises the implementation processes of chaotic watermark generation, mobile phone signal generation, embedded watermark generation, image pre-treatment, watermark embedding, signature image generation and the like. The authentication process realizes the process for verifying whether the authentication image is manipulated maliciously (the relatively serious malicious manipulation can be detected, and non-malicious slight correction can pass), and verifying the functions of copyright authentication, information source validity and the like. The authentication process is the inverse process of the signature process, the process realizes the extraction of watermarks and the phone number information extracted according to the watermark is compared with the initial phone number, so as to realize the specific function of image authentication.
Description
Technical field
This patent belongs to digital image processing techniques category.Relate generally to the correlative technology fields such as mobile computing, digital copyright protecting, pattern-recognition, information security.
Background technology
The rise of smart mobile phone is the life of people, study, work provide great convenience, and people can use smart mobile phone to process daily simple affairs very easily.Mobile phone is integrated with the function of routine office work equipment more and more, and current smart mobile phone instead of computer, camera, scanner in certain occasion, for people save a large amount of time, energy, financial cost.But along with exchanging more and more easily conveniently, the image information of mobile phone terminal collection is also more and more easily tampered, encroaches right.At present, the mode great majority for the process of image concentrate on computer end or network canbe used on line.
Digital watermark technology is mainly adopted to realize in computer end.
Summary of the invention
Present invention achieves a kind of method for mobile phone photograph certification.
The method of the mobile phone photograph certification that patent of the present invention proposes, comprises signature process and verification process two steps.
Signature process realizes the signature function being embedded in the authentication informations such as watermark at image.Signature process mainly comprises: the implementation processes such as chaotic watermarking generation, the generation of cell-phone number signal, embed watermark generation, Image semantic classification, watermark embedment, signature image generation.Verification process realizes the proof procedure of the functions such as whether authentication image is maliciously tampered (malice that degree is more serious is distorted and can be detected, the slight modifications of non-malicious can by checking), copyright authentication, information source validity.Verification process is the extraction of the inverse process to signature process, this process implementation watermark, to according to this watermark extracting cell-phone number information out and the comparison of original cell-phone number information, thus realizes the concrete function of image authentication.
Accompanying drawing explanation
Figure embeds some schematic diagram, and the point of P shown in it is embed watermark point.
Embodiment
Project implementation specifically comprises signature process and verification process two steps.
Signature process mainly comprises: the implementation processes such as chaotic watermarking generation, the generation of cell-phone number signal, embed watermark generation, Image semantic classification, watermark embedment, signature image generation.
Verification process is the extraction of the inverse process to signature process, this process implementation watermark, to according to this watermark extracting cell-phone number information out and the comparison of original cell-phone number information, thus realizes the concrete function of image authentication.
The performing step of signature process mainly contains:
1. chaos Computer image genration
The privately owned value that this process sets according to a user generates a width two-value chaos image as secret key.This process use chaos sequence is,
Use initial value is x
0, this value is the secret key that user sets.In formula, n indicates the length of production sequence, n=M*N+a.
Above-mentioned formula generates a chaos sequence, intercepts from a+1 data above-mentioned sequence.Binaryzation is carried out to the sequence intercepted, is specially,
Above-mentioned formula generates a binary sequence, is the image array CW of M*N by its transposition.
2. cellphone information Computer image genration
Cell-phone number is treated to
x
0=Number*10
-13
By the x obtained
0the image array NW of a M*N size is generated as the initial value in step 1.
3. embed watermark generates
The image array C that step 1 is generated
0the image array N generated with step 2
0carry out XOR process, use formula is,
W=XOR(CW,NW)
In formula, XOR is xor operation, and W is the watermarking images information for embedding generated.
4. Image semantic classification
Image semantic classification mainly carries out wavelet transformation to image, selects the particular sub-band of wavelet transformation, in subband, carries out Blind extracting average value processing, uses the processes such as chaos selected embedding point.
4.1 wavelet transformation
To needing the image I signed to carry out lifting wavelet transform, obtaining four subbands, being specially:
(W
LL,W
HL,W
LH,W
HH)=LFT(I
i,j)
In formula, LL is low frequency sub-band, and low frequency carries the significant energy having concentrated image.
4.2 replace center pixel value
Divide low frequency sub-band LL, be divided into the sub-block of 8*8 size, using the central point of this sub-block as embedding point, P point is embed watermark point as shown in the figure.Calculate the pixel value of center point P in this sub-block respectively, this pixel value is replaced with the average of eight pixels around it, specific implementation is:
4.3 determine to embed pixel
According to the Logistic formula in step 1, determine that a sequence length is the sequence of present image size size (I)/8 pixel size, it is sorted, then get the sequence postorder position be listed in its original sequence and form a new sequence N2.Intercept from this sequence the n-th 1 pixels, intercepting its length is M*N, forms new sequence N3.
Central pixel point all in step 4.2 be numbered, the sequence number of being numbered in N3 is defined as embed watermark point.
5 embed watermarks
Embed watermark information on the position determined, embedded mode is,
E=Value
p,ij+α*W
i,j
In formula, E is the pixel value after embed watermark, Value
p, ijreally certain pixel on allocation, W
i,jthe watermark information that to be position be on (i, j), α is watermark embed strength.
After above-mentioned steps completes, in low frequency sub-band LL, complete embedding, remember that newly-generated low frequency sub-band is W
lLN.
6. generate signature image
For the LLN generated in step 5, carry out inverse lifting wavelet transform, formula is,
IN=ILFT(W
LLN,W
HL,W
LH,W
HH)
In formula, IN is the image after signature, and ILFT () is inverse lifting wavelet transform, and WLLN is the low frequency sub-band of embed watermark information in step 5, W
hL, W
lH, W
hHit is the subband that in step 4.1, lifting wavelet transform obtains.
Verification process is responsible for extracting watermark information in signature image, and has compared the function of certification to watermark information.It specifically implements to mainly contain following steps:
1. lifting wavelet transform
This process uses identical formula manipulation with the step 4.1 of signature process.Low frequency wavelet subband can be obtained after having processed, be labeled as LLC.
2. extract watermark information
According to the mode determination embedded location introduced in signature process step 4, extract watermark information from these positions.
Determining position, first calculating the average that this pixel closes on eight neighborhood, then deducting this average with current pixel value, after intensity process, obtain watermark information, be specially,
WC
i,j=(E-ValueC
p,ij)/α
In formula, WC
i,jthe watermark information extracted, ValueC
p, ijbe eight neighborhood average, E is current pixel value, and α is watermark embed strength.
3. generate chaos image
Chaos image CWC is generated according to the mode of step 1 in signature process.
4. watermarking images extracts
The WC obtained in applying step 2, the CWC that step 3 obtains carries out xor operation, obtains the watermark information WI proposing out.Use formula to be,
WI=XOR(CWC,WC)
5. certification
Original cellphone information image NW when the watermarking images WI extract verification process and signature compares, and determines the authentication result of present image according to comparative result.Be specially,
In formula, T is the threshold value of setting, and this threshold value is set by authenticating party.
Claims (2)
1. a method for mobile phone photograph certification, is characterized in that his processing procedure is:
Project implementation specifically comprises signature process and verification process two steps; Signature process mainly comprises: the implementation processes such as chaotic watermarking generation, the generation of cell-phone number signal, embed watermark generation, Image semantic classification, watermark embedment, signature image generation;
Key of Implementation step is:
1) cellphone information Computer image genration
Cell-phone number is treated to
x
0=Number*10
-13
By the x obtained
0the image array NW of a M*N size is generated as the initial value in step 1;
2) embed watermark generates
The image array that image array and watermark generate is carried out XOR process, the watermarking images information for embedding of generation;
3) center pixel value is replaced
Low frequency sub-band is divided, is divided into the sub-block of 8*8 size, using the central point of this sub-block as embedding point embed watermark information.Calculate the pixel value of central point in this sub-block respectively, this pixel value is replaced with the average of eight pixels around it, specific implementation is:
2. the method for a kind of mobile phone photograph certification according to claim 1, is characterized in that: the original cellphone information image NW when watermarking images WI of extraction and signature compares, and is expressed as
In formula, T is the threshold value of setting, and this threshold value is set by authenticating party.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410770700.9A CN104484587A (en) | 2014-12-13 | 2014-12-13 | Mobile phone photographing authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410770700.9A CN104484587A (en) | 2014-12-13 | 2014-12-13 | Mobile phone photographing authentication method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104484587A true CN104484587A (en) | 2015-04-01 |
Family
ID=52759128
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410770700.9A Pending CN104484587A (en) | 2014-12-13 | 2014-12-13 | Mobile phone photographing authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104484587A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019089012A1 (en) * | 2017-10-31 | 2019-05-09 | Google Llc | Image processing system for verification of rendered data |
WO2021018229A1 (en) * | 2019-08-01 | 2021-02-04 | 北京大米科技有限公司 | Image processing method and apparatus, and electronic device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101719983A (en) * | 2009-12-01 | 2010-06-02 | 天津工程师范学院 | Camera capable of embedding descriptive information in photo |
CN102005026A (en) * | 2010-11-22 | 2011-04-06 | 天津职业技术师范大学 | Method for realizing robust digital watermarking by applying two-dimensional code |
CN103888851A (en) * | 2012-12-20 | 2014-06-25 | 天津职业技术师范大学 | System and method for statistics of video advertisement broadcasting |
-
2014
- 2014-12-13 CN CN201410770700.9A patent/CN104484587A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101719983A (en) * | 2009-12-01 | 2010-06-02 | 天津工程师范学院 | Camera capable of embedding descriptive information in photo |
CN102005026A (en) * | 2010-11-22 | 2011-04-06 | 天津职业技术师范大学 | Method for realizing robust digital watermarking by applying two-dimensional code |
CN103888851A (en) * | 2012-12-20 | 2014-06-25 | 天津职业技术师范大学 | System and method for statistics of video advertisement broadcasting |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019089012A1 (en) * | 2017-10-31 | 2019-05-09 | Google Llc | Image processing system for verification of rendered data |
US11710224B2 (en) | 2017-10-31 | 2023-07-25 | Google Llc | Image processing system for verification of rendered data |
WO2021018229A1 (en) * | 2019-08-01 | 2021-02-04 | 北京大米科技有限公司 | Image processing method and apparatus, and electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bedi et al. | Multimodal biometric authentication using PSO based watermarking | |
Bin et al. | An Efficient Forensic Method for Copy--move Forgery Detection Based on DWT-FWHT. | |
Hadmi et al. | Perceptual image hashing | |
Zheng et al. | Securing IoT monitoring device using PUF and physical layer authentication | |
CN104281993A (en) | Rotary attack resisting digital watermarking method based on visual encrypting and feature point matching | |
CN104408684A (en) | Digital watermarking method with high robustness | |
CN100399353C (en) | Electronic stamp certification method based on image features | |
Kukreja et al. | Copyright protection scheme for color images using extended visual cryptography | |
CN104463772A (en) | Zero watermark method for copyright protection | |
Kaur et al. | A review on image steganography techniques | |
Khan et al. | Protecting biometric data for personal identification | |
CN104484587A (en) | Mobile phone photographing authentication method | |
Kumar et al. | Digital image steganography based on combination of DCT and DWT | |
Maheswari et al. | Different methodology for image steganography-based data hiding | |
Kaur et al. | Review on Different Video Watermarking Techniques | |
Hussein | Hiding message in color image using auto key generator | |
CN111382296B (en) | Data processing method, device, terminal and storage medium | |
Bhatnagar et al. | Biometric template security based on watermarking | |
Geetha et al. | Image steganography by variable embedding and multiple edge detection using canny operator | |
Chen et al. | A novel SVD-based zero-watermarking scheme for copyright protection | |
Mehta et al. | Biometric data security using joint encryption and watermarking | |
Mahule et al. | Analysis of image security techniques using digital image watermarking in spatial domain | |
Zhang | Study on airspace covert communication algorithm of covert communication system | |
Gu et al. | Semi-blind Watermarking via Laser Engraving Attacked | |
Mehra et al. | Multimodal biometric image security using steganography and watermarking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150401 |