CN104484587A - Mobile phone photographing authentication method - Google Patents

Mobile phone photographing authentication method Download PDF

Info

Publication number
CN104484587A
CN104484587A CN201410770700.9A CN201410770700A CN104484587A CN 104484587 A CN104484587 A CN 104484587A CN 201410770700 A CN201410770700 A CN 201410770700A CN 104484587 A CN104484587 A CN 104484587A
Authority
CN
China
Prior art keywords
image
signature
watermark
authentication
generation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410770700.9A
Other languages
Chinese (zh)
Inventor
李立宗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TIANJIN YUANMU TECHNOLOGY Co Ltd
Original Assignee
TIANJIN YUANMU TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TIANJIN YUANMU TECHNOLOGY Co Ltd filed Critical TIANJIN YUANMU TECHNOLOGY Co Ltd
Priority to CN201410770700.9A priority Critical patent/CN104484587A/en
Publication of CN104484587A publication Critical patent/CN104484587A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1063Personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0042Fragile watermarking, e.g. so as to detect tampering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention provides a mobile phone photographing authentication method, and belongs to the technical field of digital image processing. The mobile phone photographing authentication method provided by the invention comprises a signature process and an authentication process. The signature process realizes the signature function of embedding authentication information such as watermark in the image. The signature process mainly comprises the implementation processes of chaotic watermark generation, mobile phone signal generation, embedded watermark generation, image pre-treatment, watermark embedding, signature image generation and the like. The authentication process realizes the process for verifying whether the authentication image is manipulated maliciously (the relatively serious malicious manipulation can be detected, and non-malicious slight correction can pass), and verifying the functions of copyright authentication, information source validity and the like. The authentication process is the inverse process of the signature process, the process realizes the extraction of watermarks and the phone number information extracted according to the watermark is compared with the initial phone number, so as to realize the specific function of image authentication.

Description

A kind of method of mobile phone photograph certification
Technical field
This patent belongs to digital image processing techniques category.Relate generally to the correlative technology fields such as mobile computing, digital copyright protecting, pattern-recognition, information security.
Background technology
The rise of smart mobile phone is the life of people, study, work provide great convenience, and people can use smart mobile phone to process daily simple affairs very easily.Mobile phone is integrated with the function of routine office work equipment more and more, and current smart mobile phone instead of computer, camera, scanner in certain occasion, for people save a large amount of time, energy, financial cost.But along with exchanging more and more easily conveniently, the image information of mobile phone terminal collection is also more and more easily tampered, encroaches right.At present, the mode great majority for the process of image concentrate on computer end or network canbe used on line.
Digital watermark technology is mainly adopted to realize in computer end.
Summary of the invention
Present invention achieves a kind of method for mobile phone photograph certification.
The method of the mobile phone photograph certification that patent of the present invention proposes, comprises signature process and verification process two steps.
Signature process realizes the signature function being embedded in the authentication informations such as watermark at image.Signature process mainly comprises: the implementation processes such as chaotic watermarking generation, the generation of cell-phone number signal, embed watermark generation, Image semantic classification, watermark embedment, signature image generation.Verification process realizes the proof procedure of the functions such as whether authentication image is maliciously tampered (malice that degree is more serious is distorted and can be detected, the slight modifications of non-malicious can by checking), copyright authentication, information source validity.Verification process is the extraction of the inverse process to signature process, this process implementation watermark, to according to this watermark extracting cell-phone number information out and the comparison of original cell-phone number information, thus realizes the concrete function of image authentication.
Accompanying drawing explanation
Figure embeds some schematic diagram, and the point of P shown in it is embed watermark point.
Embodiment
Project implementation specifically comprises signature process and verification process two steps.
Signature process mainly comprises: the implementation processes such as chaotic watermarking generation, the generation of cell-phone number signal, embed watermark generation, Image semantic classification, watermark embedment, signature image generation.
Verification process is the extraction of the inverse process to signature process, this process implementation watermark, to according to this watermark extracting cell-phone number information out and the comparison of original cell-phone number information, thus realizes the concrete function of image authentication.
The performing step of signature process mainly contains:
1. chaos Computer image genration
The privately owned value that this process sets according to a user generates a width two-value chaos image as secret key.This process use chaos sequence is,
x n + 1 = 1 - 2 x n 2 x n ∈ [ - 1,1 ]
Use initial value is x 0, this value is the secret key that user sets.In formula, n indicates the length of production sequence, n=M*N+a.
Above-mentioned formula generates a chaos sequence, intercepts from a+1 data above-mentioned sequence.Binaryzation is carried out to the sequence intercepted, is specially,
x n = 1 x n > = 0 0 else
Above-mentioned formula generates a binary sequence, is the image array CW of M*N by its transposition.
2. cellphone information Computer image genration
Cell-phone number is treated to
x 0=Number*10 -13
By the x obtained 0the image array NW of a M*N size is generated as the initial value in step 1.
3. embed watermark generates
The image array C that step 1 is generated 0the image array N generated with step 2 0carry out XOR process, use formula is,
W=XOR(CW,NW)
In formula, XOR is xor operation, and W is the watermarking images information for embedding generated.
4. Image semantic classification
Image semantic classification mainly carries out wavelet transformation to image, selects the particular sub-band of wavelet transformation, in subband, carries out Blind extracting average value processing, uses the processes such as chaos selected embedding point.
4.1 wavelet transformation
To needing the image I signed to carry out lifting wavelet transform, obtaining four subbands, being specially:
(W LL,W HL,W LH,W HH)=LFT(I i,j)
In formula, LL is low frequency sub-band, and low frequency carries the significant energy having concentrated image.
4.2 replace center pixel value
Divide low frequency sub-band LL, be divided into the sub-block of 8*8 size, using the central point of this sub-block as embedding point, P point is embed watermark point as shown in the figure.Calculate the pixel value of center point P in this sub-block respectively, this pixel value is replaced with the average of eight pixels around it, specific implementation is:
Value P = 1 8 Σ i = 0 7 Value i
4.3 determine to embed pixel
According to the Logistic formula in step 1, determine that a sequence length is the sequence of present image size size (I)/8 pixel size, it is sorted, then get the sequence postorder position be listed in its original sequence and form a new sequence N2.Intercept from this sequence the n-th 1 pixels, intercepting its length is M*N, forms new sequence N3.
Central pixel point all in step 4.2 be numbered, the sequence number of being numbered in N3 is defined as embed watermark point.
5 embed watermarks
Embed watermark information on the position determined, embedded mode is,
E=Value p,ij+α*W i,j
In formula, E is the pixel value after embed watermark, Value p, ijreally certain pixel on allocation, W i,jthe watermark information that to be position be on (i, j), α is watermark embed strength.
After above-mentioned steps completes, in low frequency sub-band LL, complete embedding, remember that newly-generated low frequency sub-band is W lLN.
6. generate signature image
For the LLN generated in step 5, carry out inverse lifting wavelet transform, formula is,
IN=ILFT(W LLN,W HL,W LH,W HH)
In formula, IN is the image after signature, and ILFT () is inverse lifting wavelet transform, and WLLN is the low frequency sub-band of embed watermark information in step 5, W hL, W lH, W hHit is the subband that in step 4.1, lifting wavelet transform obtains.
Verification process is responsible for extracting watermark information in signature image, and has compared the function of certification to watermark information.It specifically implements to mainly contain following steps:
1. lifting wavelet transform
This process uses identical formula manipulation with the step 4.1 of signature process.Low frequency wavelet subband can be obtained after having processed, be labeled as LLC.
2. extract watermark information
According to the mode determination embedded location introduced in signature process step 4, extract watermark information from these positions.
Determining position, first calculating the average that this pixel closes on eight neighborhood, then deducting this average with current pixel value, after intensity process, obtain watermark information, be specially,
WC i,j=(E-ValueC p,ij)/α
In formula, WC i,jthe watermark information extracted, ValueC p, ijbe eight neighborhood average, E is current pixel value, and α is watermark embed strength.
3. generate chaos image
Chaos image CWC is generated according to the mode of step 1 in signature process.
4. watermarking images extracts
The WC obtained in applying step 2, the CWC that step 3 obtains carries out xor operation, obtains the watermark information WI proposing out.Use formula to be,
WI=XOR(CWC,WC)
5. certification
Original cellphone information image NW when the watermarking images WI extract verification process and signature compares, and determines the authentication result of present image according to comparative result.Be specially,
In formula, T is the threshold value of setting, and this threshold value is set by authenticating party.

Claims (2)

1. a method for mobile phone photograph certification, is characterized in that his processing procedure is:
Project implementation specifically comprises signature process and verification process two steps; Signature process mainly comprises: the implementation processes such as chaotic watermarking generation, the generation of cell-phone number signal, embed watermark generation, Image semantic classification, watermark embedment, signature image generation;
Key of Implementation step is:
1) cellphone information Computer image genration
Cell-phone number is treated to
x 0=Number*10 -13
By the x obtained 0the image array NW of a M*N size is generated as the initial value in step 1;
2) embed watermark generates
The image array that image array and watermark generate is carried out XOR process, the watermarking images information for embedding of generation;
3) center pixel value is replaced
Low frequency sub-band is divided, is divided into the sub-block of 8*8 size, using the central point of this sub-block as embedding point embed watermark information.Calculate the pixel value of central point in this sub-block respectively, this pixel value is replaced with the average of eight pixels around it, specific implementation is:
Value P = 1 8 Σ i = 0 7 Value i
2. the method for a kind of mobile phone photograph certification according to claim 1, is characterized in that: the original cellphone information image NW when watermarking images WI of extraction and signature compares, and is expressed as
In formula, T is the threshold value of setting, and this threshold value is set by authenticating party.
CN201410770700.9A 2014-12-13 2014-12-13 Mobile phone photographing authentication method Pending CN104484587A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410770700.9A CN104484587A (en) 2014-12-13 2014-12-13 Mobile phone photographing authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410770700.9A CN104484587A (en) 2014-12-13 2014-12-13 Mobile phone photographing authentication method

Publications (1)

Publication Number Publication Date
CN104484587A true CN104484587A (en) 2015-04-01

Family

ID=52759128

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410770700.9A Pending CN104484587A (en) 2014-12-13 2014-12-13 Mobile phone photographing authentication method

Country Status (1)

Country Link
CN (1) CN104484587A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019089012A1 (en) * 2017-10-31 2019-05-09 Google Llc Image processing system for verification of rendered data
WO2021018229A1 (en) * 2019-08-01 2021-02-04 北京大米科技有限公司 Image processing method and apparatus, and electronic device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719983A (en) * 2009-12-01 2010-06-02 天津工程师范学院 Camera capable of embedding descriptive information in photo
CN102005026A (en) * 2010-11-22 2011-04-06 天津职业技术师范大学 Method for realizing robust digital watermarking by applying two-dimensional code
CN103888851A (en) * 2012-12-20 2014-06-25 天津职业技术师范大学 System and method for statistics of video advertisement broadcasting

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719983A (en) * 2009-12-01 2010-06-02 天津工程师范学院 Camera capable of embedding descriptive information in photo
CN102005026A (en) * 2010-11-22 2011-04-06 天津职业技术师范大学 Method for realizing robust digital watermarking by applying two-dimensional code
CN103888851A (en) * 2012-12-20 2014-06-25 天津职业技术师范大学 System and method for statistics of video advertisement broadcasting

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019089012A1 (en) * 2017-10-31 2019-05-09 Google Llc Image processing system for verification of rendered data
US11710224B2 (en) 2017-10-31 2023-07-25 Google Llc Image processing system for verification of rendered data
WO2021018229A1 (en) * 2019-08-01 2021-02-04 北京大米科技有限公司 Image processing method and apparatus, and electronic device

Similar Documents

Publication Publication Date Title
Bedi et al. Multimodal biometric authentication using PSO based watermarking
Bin et al. An Efficient Forensic Method for Copy--move Forgery Detection Based on DWT-FWHT.
Hadmi et al. Perceptual image hashing
Zheng et al. Securing IoT monitoring device using PUF and physical layer authentication
CN104281993A (en) Rotary attack resisting digital watermarking method based on visual encrypting and feature point matching
CN104408684A (en) Digital watermarking method with high robustness
CN100399353C (en) Electronic stamp certification method based on image features
Kukreja et al. Copyright protection scheme for color images using extended visual cryptography
CN104463772A (en) Zero watermark method for copyright protection
Kaur et al. A review on image steganography techniques
Khan et al. Protecting biometric data for personal identification
CN104484587A (en) Mobile phone photographing authentication method
Kumar et al. Digital image steganography based on combination of DCT and DWT
Maheswari et al. Different methodology for image steganography-based data hiding
Kaur et al. Review on Different Video Watermarking Techniques
Hussein Hiding message in color image using auto key generator
CN111382296B (en) Data processing method, device, terminal and storage medium
Bhatnagar et al. Biometric template security based on watermarking
Geetha et al. Image steganography by variable embedding and multiple edge detection using canny operator
Chen et al. A novel SVD-based zero-watermarking scheme for copyright protection
Mehta et al. Biometric data security using joint encryption and watermarking
Mahule et al. Analysis of image security techniques using digital image watermarking in spatial domain
Zhang Study on airspace covert communication algorithm of covert communication system
Gu et al. Semi-blind Watermarking via Laser Engraving Attacked
Mehra et al. Multimodal biometric image security using steganography and watermarking

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150401