CN104935783A - Safe and active image tampering detection method and device - Google Patents

Safe and active image tampering detection method and device Download PDF

Info

Publication number
CN104935783A
CN104935783A CN201510329688.2A CN201510329688A CN104935783A CN 104935783 A CN104935783 A CN 104935783A CN 201510329688 A CN201510329688 A CN 201510329688A CN 104935783 A CN104935783 A CN 104935783A
Authority
CN
China
Prior art keywords
image
value
character string
specified type
type character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510329688.2A
Other languages
Chinese (zh)
Other versions
CN104935783B (en
Inventor
赵东
马华东
陈建伟
李天元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201510329688.2A priority Critical patent/CN104935783B/en
Publication of CN104935783A publication Critical patent/CN104935783A/en
Application granted granted Critical
Publication of CN104935783B publication Critical patent/CN104935783B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks

Abstract

The embodiment of the present invention discloses a safe and active image tampering detection method and device. The method comprises: sending end equipment obtaining a first image, generating a random value of which the length is a second numerical value, obtaining a pre-configured fixed value of which the length is a third numerical value, and using the random value and the fixed value for generating a specified type character string of which the length is a first numerical value; performing Hash operation on the first image and the specified type character string by using an information digest algorithm to obtain a first information digest value; performing encryption processing on the specified type character string by using an encryption algorithm to obtain an encrypted specified type character string; adding the first information digest value and the encrypted specified type character string to the first image for obtaining a second image; sending the second image to receiving end equipment; and the receiving end equipment using the first information digest value and the encrypted specified type character string for detecting whether the first image is tampered or not. In the embodiment of the present invention, the image integrity and the image authenticity in the process of obtaining evidence for the images are ensured.

Description

A kind of safe active distorted image detection method and device
Technical field
The present invention relates to Computer Applied Technology field, particularly a kind of safe active distorted image detection method and device.
Background technology
In order to whether detected image is tampered in evidence obtaining process, sending ending equipment and receiving device can arrange identical message digest algorithm, as MAC (Message Authentication Code, message authentication code) algorithm.Sending ending equipment, before transmission original image, utilizes MAC algorithm to carry out Hash computing to original image, obtains first information digest value, and first information digest value is sent to receiving device together with original image.Receiving device, after receiving first information digest value and original image, utilizes identical MAC algorithm to carry out Hash computing to original image, obtains the second informative abstract value.If first information digest value is identical with the second informative abstract value, then receiving device detects that original image is not tampered; If first information digest value is different with the second informative abstract value, then receiving device detects that original image is tampered.
Because MAC algorithm has been disclosed message digest algorithm, assailant can after intercepting and capturing first information digest value and original image, isolate first information digest value and original image, original image is distorted, and utilize MAC algorithm to carry out Hash computing to distorting rear image, obtain the 3rd informative abstract value, first information digest value is replaced with the 3rd informative abstract value, and by the 3rd informative abstract value with distort rear image and send to receiving device.Receiving device is receiving the 3rd informative abstract value and after distorting after image, MAC algorithm is utilized to carry out Hash computing to distorting rear image, obtain the second informative abstract value, and the 3rd informative abstract value is identical with the second informative abstract value, therefore receiving device detects that distorting rear image is not tampered.
Obviously, in said process, original image is tampered, but receiving device cannot detect that original image is tampered, thus the testing result led to errors, cannot accurately detected image whether be tampered.
Summary of the invention
The embodiment of the invention discloses a kind of safe active distorted image detection method and device, whether be tampered with accurate detected image, ensure the image integrity of image in evidence obtaining process and image's authenticity.
For achieving the above object, in the embodiment of the present invention, provide following technical scheme:
The embodiment of the invention discloses a kind of safe active distorted image detection method, said method comprising the steps of:
Sending ending equipment obtains the first image, and generates specified type character string;
Described sending ending equipment utilizes message digest algorithm to carry out Hash computing to described first image and described specified type character string, obtains first information digest value; Described sending ending equipment utilizes cryptographic algorithm to be encrypted described specified type character string, obtains the specified type character string after encrypting;
Specified type character string after described first information digest value and described encryption is added in described first image by described sending ending equipment, obtains the second image;
Described second image is sent to receiving device by described sending ending equipment; Utilize first information digest value and the specified type character string after encrypting to detect the first image by receiving device whether to be tampered.
The length of described specified type character string is the first numerical value, described sending ending equipment generates the process of specified type character string, specifically comprise: it is the random value of second value that described sending ending equipment generates length, and obtain the fixed value that length pre-configured on described sending ending equipment is third value, and the fixed value that the random value utilizing described length to be second value and described length are third value generates the specified type character string that length is the first numerical value; Wherein, described second value and described third value sum are described first numerical value.
After described sending ending equipment adds the specified type character string after described first information digest value and described encryption to described first image, before described second image is sent to receiving device, described method comprises further: described sending ending equipment determines the positional information of specified type character string in described second image after described first information digest value and encryption, and described positional information is added in described second image.
The embodiment of the invention discloses a kind of safe active distorted image detection method, said method comprising the steps of:
Receiving device receives the second image from sending ending equipment; Specified type character string after the encryption that described second image comprises the first image, the first information digest value that described sending ending equipment obtains after utilizing message digest algorithm to carry out Hash computing to the first image and specified type character string, described sending ending equipment obtain after utilizing cryptographic algorithm to be encrypted described specified type character string;
Described receiving device parses the specified type character string after described first image, described first information digest value, described encryption from described second image;
Described receiving device utilizes decipherment algorithm corresponding to described cryptographic algorithm to be decrypted process to the specified type character string after described encryption, obtain specified type character string, and utilize described message digest algorithm to carry out Hash computing to described first image and described specified type character string, obtain the second informative abstract value;
If described first information digest value is different with described second informative abstract value, then described receiving device detects that described first image is tampered; If described first information digest value is identical with described second informative abstract value, then described receiving device detects that described first image is not tampered.
After described receiving device obtains specified type character string, before obtaining the second informative abstract value, described method comprises further: described receiving device obtains the fixed value that length pre-configured on described receiving device is third value, and whether the ad-hoc location judging described specified type character string is length is the fixed value of third value; If so, then described receiving device performs and utilizes described message digest algorithm to carry out Hash computing to described first image and described specified type character string, obtains the process of the second informative abstract value;
If not, then described receiving device detects that described first image is tampered.
The positional information of specified type character string in described second image after first information digest value and encryption is also comprised in described second image; Described receiving device parses the process of the specified type character string after described first image, described first information digest value, described encryption from described second image, specifically comprises:
Described receiving device parses described positional information from described second image;
Specified type character string after described receiving device utilizes described positional information to parse described first information digest value and described encryption from described second image;
Content outside specified type character string after described receiving device determines described positional information, described first information digest value and described encryption is described first image.
The embodiment of the invention discloses a kind of sending ending equipment, described sending ending equipment specifically comprises:
Generation module, for obtaining the first image, and generates specified type character string;
Obtaining module, for utilizing message digest algorithm to carry out Hash computing to described first image and described specified type character string, obtaining first information digest value; And utilize cryptographic algorithm to be encrypted described specified type character string, obtain the specified type character string after encrypting;
Processing module, for the specified type character string after described first information digest value and described encryption being added in described first image, obtains the second image;
Sending module, for sending to receiving device by described second image; Utilize first information digest value and the specified type character string after encrypting to detect the first image by receiving device whether to be tampered.
The length of described specified type character string is the first numerical value, described generation module, specifically in the process generating specified type character string, generating length is the random value of second value, and obtain the fixed value that length pre-configured on described sending ending equipment is third value, and the fixed value that the random value utilizing described length to be second value and described length are third value generates the specified type character string that length is the first numerical value; Wherein, described second value and described third value sum are described first numerical value;
Described processing module, also for after adding the specified type character string after described first information digest value and described encryption to described first image, before described second image is sent to receiving device, determine the positional information of specified type character string in described second image after described first information digest value and encryption, and described positional information is added in described second image.
The embodiment of the invention discloses a kind of receiving device, described receiving device specifically comprises:
Receiver module, for receiving the second image from sending ending equipment; Specified type character string after the encryption that described second image comprises the first image, the first information digest value that described sending ending equipment obtains after utilizing message digest algorithm to carry out Hash computing to the first image and specified type character string, described sending ending equipment obtain after utilizing cryptographic algorithm to be encrypted described specified type character string;
Parsing module, for parsing the specified type character string after described first image, described first information digest value, described encryption from described second image;
Obtain module, for utilizing decipherment algorithm corresponding to described cryptographic algorithm, process is decrypted to the specified type character string after described encryption, obtain specified type character string, and utilize described message digest algorithm to carry out Hash computing to described first image and described specified type character string, obtain the second informative abstract value;
Detection module, if different with described second informative abstract value for described first information digest value, then detects that described first image is tampered; If described first information digest value is identical with described second informative abstract value, then detect that described first image is not tampered.
Described acquisition module, specifically for after obtaining specified type character string, before obtaining the second informative abstract value, obtain the fixed value that length pre-configured on described receiving device is third value, and whether the ad-hoc location judging described specified type character string is length is the fixed value of third value; If judged result is yes, then performs and utilize described message digest algorithm to carry out Hash computing to described first image and described specified type character string, obtain the process of the second informative abstract value; Described detection module, also for whether being after length is the fixed value of third value at the ad-hoc location judging described specified type character string, if judged result is no, then detects that described first image is tampered;
Described second image comprises the positional information of specified type character string in the second image after first information digest value and encryption; Described parsing module, in process specifically for the specified type character string after parse described first image, described first information digest value, described encryption from described second image, described positional information is parsed from the second image, specified type character string after utilizing described positional information to parse described first information digest value and described encryption from described second image, determines that the content outside the specified type character string after described positional information, described first information digest value and described encryption is described first image.
Based on technique scheme, compared with prior art, the embodiment of the present invention at least has the following advantages: in the embodiment of the present invention, by informative abstract value is added in image, make assailant after intercepting and capturing comprise the image of informative abstract value, informative abstract value and image cannot be isolated, even if assailant distorts image, and obtain informative abstract value corresponding to the image after distorting, also the informative abstract value comprised in image cannot be replaced with the informative abstract value that assailant obtains, thus the informative abstract value making receiving device can calculate based on self accurately detects whether image is tampered, avoid the testing result of mistake, ensure the image integrity in image forensics process and image's authenticity.Further, sending ending equipment is by using specified type character string computing information digest value, and by cryptographic algorithm, specified type character string is encrypted, make assailant after intercepting and capturing comprise the image of informative abstract value, because specified type character string is transmitted with the form of ciphertext, therefore the specified type character string after deciphering cannot be obtained, also specified type character string computing information digest value cannot just be used, thus cause assailant cannot obtain the informative abstract value of corresponding specified type character string, when receiving device uses specified type character string computing information digest value, accurately can detect whether image is tampered, ensure the image integrity in image forensics process and image's authenticity.Further, sending ending equipment is before transmission second image, that the second image that with the addition of informative abstract value and the specified type character string after encrypting is stored in sending ending equipment, now, even if user distorts the second image stored in sending ending equipment, then receiving device also accurately can detect after receiving the second image whether image is tampered, thus ensures the image integrity in image forensics process and image's authenticity.Further, transmit by the specified type character string after informative abstract value and encryption is dissolved in image, thus greatly easy transmission complexity, and because the length of the specified type character string after informative abstract value and encryption is relative to very little image, therefore can not impact image, conceal the specified type character string after informative abstract value and encryption so to a certain extent, improve fail safe during image transmitting.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of safe active distorted image detection method schematic flow sheet proposed in the embodiment of the present invention one;
Fig. 2 is a kind of safe active distorted image detection method schematic flow sheet proposed in the embodiment of the present invention two;
Fig. 3 and Fig. 4 is the active distorted image detection method flow chart of safety of sending ending equipment, the active distorted image detection method flow chart of the safety of receiving device that propose in the embodiment of the present invention two;
Fig. 5 is a kind of safe active distorted image detection method schematic flow sheet proposed in the embodiment of the present invention three;
Fig. 6 is the structural representation of a kind of sending ending equipment proposed in the embodiment of the present invention four;
Fig. 7 is the structural representation of a kind of receiving device proposed in the embodiment of the present invention five.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Embodiment one
For problems of the prior art, propose a kind of safe active distorted image detection method in the embodiment of the present invention one, be applied in the system comprising sending ending equipment and receiving device.Wherein, sending ending equipment refers to the equipment sending image, and receiving device refers to and receives image and equipment image being carried out to integrity detection.Under a kind of embody rule scene, sending ending equipment can be terminal equipment, and receiving device can be application server.In the embodiment of the present invention, the image of indication specifically includes but not limited to the image that the aware application of terminal equipment produces, such as, the report image that can produce for environmental pollution report application, public arena management application produce managing image, accident take pictures forensic applications produce photograph image etc.
It should be noted that digital image evidence collecting technology has become advanced subject both domestic and external, there is Important Academic and be worth and social effect.Digital image evidence collecting technology is divided into passive type digital image evidence collecting technology and active mode digital image forensic technologies.Passive type digital image evidence collecting technology is by the analysis to image statistics, judges the authenticity and integrity of digital image content.Active mode digital image forensic technologies utilizes to be embedded in additional information in digital picture in advance to verify the authenticity and integrity of digital image content.The application scenarios that the embodiment of the present invention is suitable for is the distorted image detection method based on active mode digital image forensic technologies.
Based on above-mentioned application scenarios, as shown in Figure 1, the active distorted image detection method of this safety can comprise the following steps:
Step 101, sending ending equipment obtains the first image, and generates specified type character string.
Such as, when evidence obtaining is taken pictures in environmental pollution report application to contamination phenomenon, this environmental pollution report application can produce report image, and this report image is photograph image.Based on the photograph image that this environmental pollution report application produces, sending ending equipment can obtain this photograph image.In the embodiment of the present invention, image aware application produced is called the first image, and sending ending equipment can obtain this first image.
Wherein, sending ending equipment is after acquisition first image, specified type character string can be generated, this specified type character string can be binary type character string, and the length of this binary type character string can be arranged according to practical experience, such as, the length of binary type character string can be 16.
For multiple first images that sending ending equipment obtains, the specified type character string of generation can be identical, also can be different, as can be stochastic generation length be the binary type character string of the first numerical value.
Step 102, sending ending equipment utilizes message digest algorithm to carry out Hash computing to the first image and specified type character string, obtains first information digest value.Wherein, message digest algorithm can be configured according to practical experience, and the message digest algorithm that sending ending equipment configures is identical with the message digest algorithm that receiving device configures.Further, this message digest algorithm specifically can include but not limited to: MD5 (MessageDigest, eap-message digest) algorithm, SHA1 (Secure Hash Algorithm, SHA), MAC algorithm etc.For convenience of description, follow-up take message digest algorithm as MD5 algorithm for example is described.
In the embodiment of the present invention, sending ending equipment carries out Hash computing to the first image and specified type character string utilizing MD5 algorithm, obtain in the process of first information digest value, the binary type character string shifting combination of the first image and 16 is bit stream by sending ending equipment, it can be used as the input value of MD5 algorithm, obtain first information digest value, this first information digest value can be the informative abstract value of 128.
Step 103, sending ending equipment utilizes cryptographic algorithm to be encrypted specified type character string, obtains the specified type character string after encrypting.Wherein, cryptographic algorithm can be configured according to practical experience, and for the cryptographic algorithm that sending ending equipment configures, receiving device is configured with the decipherment algorithm of this cryptographic algorithm.
Such as, this cryptographic algorithm can be RSA (encryption key algorithm), and this RSA comprises public-key cryptography and privacy key.Sending ending equipment is configured with the public-key cryptography of RSA, as be provided with the public-key cryptography of RSA in the aware application of sending ending equipment in advance, sending ending equipment can utilize the disclosure double secret key specified type character string (the binary type character strings as 16) to be encrypted, and obtains the specified type character string after encrypting.Further, receiving device is configured with the privacy key of RSA, receiving device can utilize this privacy key to be decrypted process to the specified type character string after encryption, obtains the specified type character string (the binary type character strings as 16) utilized before public key encryption process.
In the embodiment of the present invention, sending ending equipment is encrypted specified type character string utilizing cryptographic algorithm, after obtaining the specified type character string after encrypting, can also delete specified type character string.
Step 104, the specified type character string (obtaining in step 103) after first information digest value (obtaining in step 102) and encryption is added in the first image by sending ending equipment, obtains the second image.
Step 105, the second image is sent to receiving device by sending ending equipment.Afterwards, utilize first information digest value and the specified type character string after encrypting to detect the first image by receiving device whether to be tampered.
In image transmitting process, usually can comprise control section and image section.In prior art, add informative abstract value to control section, add the first image to image section.Based on this, assailant can separate out informative abstract value from control section Directly solution.In the embodiment of the present invention, specified type character string after first information digest value and encryption is added in the first image by sending ending equipment, namely image section is added to, now image section comprises the first image, first information digest value and the specified type character string after encrypting, instead of adds the specified type character string after first information digest value and encryption to control section.Based on this, assailant cannot separate out the specified type character string after first information digest value and encryption from control section Directly solution.Transmit by the specified type character string after first information digest value and encryption is dissolved in image, greatly easy transmission complexity, because the length of the specified type character string after first information digest value and encryption is relative to very little the first image, therefore can not impact image, conceal the specified type character string after informative abstract value and encryption so to a certain extent, improve fail safe during image transmitting.
Step 106, receiving device receives the second image from sending ending equipment, and from this second image, parse the specified type character string after the first image, first information digest value, encryption.
Step 107, the decipherment algorithm that receiving device utilizes cryptographic algorithm corresponding is decrypted process to the specified type character string after encryption, obtain specified type character string, and utilize message digest algorithm to carry out Hash computing to the first image and specified type character string, obtain the second informative abstract value.
Wherein, cryptographic algorithm refers to the cryptographic algorithm of sending ending equipment for being encrypted specified type character string, and such as, cryptographic algorithm can be RSA.Based on this, receiving device is configured with the privacy key of RSA, receiving device can utilize this privacy key to be decrypted process to the specified type character string after encryption, obtains sending ending equipment and utilizes specified type character string before public key encryption process.Further, the message digest algorithm that receiving device configures is identical with the message digest algorithm that sending ending equipment configures, and this message digest algorithm specifically can include but not limited to: MD5 algorithm, SHA1, MAC algorithm etc.
Step 108, based on first information digest value and the second informative abstract value, if first information digest value is different with the second informative abstract value, then receiving device detects that the first image is tampered; If first information digest value is identical with the second informative abstract value, then receiving device detects that the first image is not tampered.
Based on technique scheme, compared with prior art, the embodiment of the present invention at least has the following advantages: in the embodiment of the present invention, by informative abstract value is added in image, make assailant after intercepting and capturing comprise the image of informative abstract value, informative abstract value and image cannot be isolated, even if assailant distorts image, and obtain informative abstract value corresponding to the image after distorting, also the informative abstract value comprised in image cannot be replaced with the informative abstract value that assailant obtains, thus the informative abstract value making receiving device can calculate based on self accurately detects whether image is tampered, avoid the testing result of mistake, ensure the image integrity in image forensics process and image's authenticity.Further, sending ending equipment is by using specified type character string computing information digest value, and by cryptographic algorithm, specified type character string is encrypted, make assailant after intercepting and capturing comprise the image of informative abstract value, because specified type character string is transmitted with the form of ciphertext, therefore the specified type character string after deciphering cannot be obtained, also specified type character string computing information digest value cannot just be used, thus cause assailant cannot obtain the informative abstract value of corresponding specified type character string, when receiving device uses specified type character string computing information digest value, accurately can detect whether image is tampered, ensure the image integrity in image forensics process and image's authenticity.Further, sending ending equipment is before transmission second image, that the second image that with the addition of informative abstract value and the specified type character string after encrypting is stored in sending ending equipment, now, even if user distorts the second image stored in sending ending equipment, then receiving device also accurately can detect after receiving the second image whether image is tampered, thus ensures the image integrity in image forensics process and image's authenticity.
Embodiment two
Propose a kind of safe active distorted image detection method in the embodiment of the present invention two, the method can be applied in the system comprising sending ending equipment and receiving device.Wherein, sending ending equipment refers to the equipment sending image, and receiving device refers to and receives image and equipment image being carried out to integrity detection.Under a kind of embody rule scene, sending ending equipment can be terminal equipment, and receiving device can be application server.
In the embodiment of the present invention, the image of indication specifically includes but not limited to the image that the aware application of terminal equipment produces, such as, the report image that can produce for environmental pollution report application, public arena management application produce managing image, accident take pictures forensic applications produce photograph image etc.
It should be noted that digital image evidence collecting technology has become advanced subject both domestic and external, there is Important Academic and be worth and social effect.Digital image evidence collecting technology is divided into passive type digital image evidence collecting technology and active mode digital image forensic technologies.Passive type digital image evidence collecting technology is by the analysis to image statistics, judges the authenticity and integrity of digital image content.Active mode digital image forensic technologies utilizes to be embedded in additional information in digital picture in advance to verify the authenticity and integrity of digital image content.The application scenarios that the embodiment of the present invention is suitable for is the distorted image detection method based on active mode digital image forensic technologies.
Based on above-mentioned application scenarios, as shown in Figure 2, the active distorted image detection method of this safety can comprise the following steps:
Step 201, sending ending equipment obtains the first image, generating length is the random value of second value, and obtain the fixed value that length pre-configured on sending ending equipment is third value, and the fixed value that the random value utilizing length to be second value and length are third value generates the specified type character string that length is the first numerical value.Wherein, the first numerical value, second value, third value all can be arranged according to practical experience, and second value and third value sum are the first numerical value, and if second value is 12, third value is the 4, first numerical value is 16.
Such as, when evidence obtaining is taken pictures in environmental pollution report application to contamination phenomenon, this environmental pollution report application can produce report image, and this report image is photograph image.Based on the photograph image that this environmental pollution report application produces, sending ending equipment can obtain this photograph image.In the embodiment of the present invention, image aware application produced is called the first image, and sending ending equipment can obtain this first image.
In the embodiment of the present invention, for multiple first images that sending ending equipment obtains, the specified type character string of generation can be identical, also can be different.
In the embodiment of the present invention, sending ending equipment, after acquisition first image, can generate the specified type character string that length is the first numerical value, and this specified type character string can be binary type character string, as the binary type character string of 16.In the process generating specified type character string, it is the random value of second value that sending ending equipment generates length, the fixed value that length is third value is obtained from sending ending equipment, the fixed value of to be the random value of second value and length by length be third value is combined, and obtains specified type character string.Such as, the random value that sending ending equipment stochastic generation is 12, and obtain the fixed value of 4, by the random value of 12 sequence before the fixed value of 4, obtain the binary type character string of 16, or, by the fixed value of 4 sequence before the random value of 12, obtain the binary type character string of 16.
Wherein, on sending ending equipment, pre-configured length is the fixed value of third value, as fixed value 1001, and specifies before fixed value is positioned at random value, or specifies after fixed value is positioned at random value.Meanwhile, on receiving device, also pre-configured length is the fixed value of third value, as fixed value 1001, and specifies before fixed value is positioned at random value, or specifies after fixed value is positioned at random value.
Step 202, sending ending equipment utilizes message digest algorithm to carry out Hash computing to the first image and specified type character string, obtains first information digest value.Message digest algorithm can be configured according to practical experience, and the message digest algorithm that sending ending equipment configures is identical with the message digest algorithm that receiving device configures.This message digest algorithm specifically can include but not limited to: MD5 algorithm, SHA1, MAC algorithm etc.
In the embodiment of the present invention, sending ending equipment carries out Hash computing to the first image and specified type character string utilizing MD5 algorithm, obtain in the process of first information digest value, the binary type character string shifting combination of the first image and 16 is bit stream by sending ending equipment, it can be used as the input value of MD5 algorithm, obtain first information digest value, this first information digest value can be the informative abstract value of 128.
Step 203, sending ending equipment utilizes cryptographic algorithm to be encrypted specified type character string, obtains the specified type character string after encrypting.Wherein, cryptographic algorithm can be configured according to practical experience, and for the cryptographic algorithm that sending ending equipment configures, receiving device is configured with the decipherment algorithm of this cryptographic algorithm.
Such as, this cryptographic algorithm can be RSA, and this RSA comprises public-key cryptography and privacy key.Sending ending equipment is configured with the public-key cryptography of RSA, and sending ending equipment can utilize the disclosure double secret key specified type character string (the binary type character strings as 16) to be encrypted, and obtains the specified type character string after encrypting.Further, receiving device is configured with the privacy key of RSA, receiving device can utilize this privacy key to be decrypted process to the specified type character string after encryption, obtains the specified type character string (the binary type character strings as 16) utilized before public key encryption process.
In the embodiment of the present invention, sending ending equipment is encrypted specified type character string utilizing cryptographic algorithm, after obtaining the specified type character string after encrypting, can also delete specified type character string.
Step 204, the specified type character string (obtaining in step 203) after first information digest value (obtaining in step 202) and encryption is added in the first image by sending ending equipment, obtains the second image.
Step 205, the second image is sent to receiving device by sending ending equipment.Afterwards, utilize first information digest value and the specified type character string after encrypting to detect the first image by receiving device whether to be tampered.
In image transmitting process, usually can comprise control section and image section.In prior art, add informative abstract value to control section, add the first image to image section.Based on this, assailant can separate out informative abstract value from control section Directly solution.In the embodiment of the present invention, specified type character string after first information digest value and encryption is added in the first image by sending ending equipment, namely image section is added to, now image section comprises the first image, first information digest value and the specified type character string after encrypting, instead of adds the specified type character string after first information digest value and encryption to control section.Based on this, assailant cannot separate out the specified type character string after first information digest value and encryption from control section Directly solution.Transmit by the specified type character string after first information digest value and encryption is dissolved in image, greatly easy transmission complexity, because the length of the specified type character string after first information digest value and encryption is relative to very little the first image, therefore can not impact image, conceal the specified type character string after informative abstract value and encryption so to a certain extent, improve fail safe during image transmitting.
Wherein, for above-mentioned steps 201-step 205, corresponding handling process can be as shown in Figure 3.
Step 206, receiving device receives the second image from sending ending equipment, and from this second image, parse the specified type character string after the first image, first information digest value, encryption.
Step 207, the decipherment algorithm that receiving device utilizes cryptographic algorithm corresponding is decrypted process to the specified type character string after encryption, obtains specified type character string, the fixed value of the ad-hoc location judging specified type character string whether be length be third value.If not, perform step 208, if so, perform step 209.
Wherein, cryptographic algorithm refers to the cryptographic algorithm of sending ending equipment for being encrypted specified type character string, and such as, cryptographic algorithm can be RSA.Based on this, receiving device is configured with the privacy key of RSA, receiving device can utilize this privacy key to be decrypted process to the specified type character string after encryption, obtains sending ending equipment and utilizes specified type character string before public key encryption process.
Wherein, on sending ending equipment, pre-configured length is the fixed value of third value, as fixed value 1001, and specify after fixed value is positioned at random value, on receiving device, pre-configured length is the fixed value of third value, as fixed value 1001, and specifies after fixed value is positioned at random value.Based on this, after receiving device obtains specified type character string, obtaining pre-configured length on receiving device is the fixed value of third value, and whether the ad-hoc location (i.e. rearmost third value position) judging specified type character string is length is the fixed value of third value, as whether last 4 that judge specified type character string be fixed value 1001.Or on sending ending equipment, pre-configured length is the fixed value of third value, as fixed value 1001, and specify before fixed value is positioned at random value, on receiving device, pre-configured length is the fixed value of third value, as fixed value 1001, and specifies before fixed value is positioned at random value.Based on this, after receiving device obtains specified type character string, obtaining pre-configured length on receiving device is the fixed value of third value, and whether the ad-hoc location (i.e. the third value position of foremost) judging specified type character string is length is the fixed value of third value, as whether the most first 4 that judge specified type character string be fixed value 1001.
Step 208, receiving device detects that the first image is tampered.
In the embodiment of the present invention, when generation length is the specified type character string of the first numerical value, by arranging the fixed value that length is third value, thus when assailant revises specified type character string voluntarily, can detect that image is tampered, improve the accuracy detected.Such as, when assailant modifies to specified type character string, it can not know the fixed value information in specified type character string, assailant understands stochastic generation specified type character string, therefore, receiving device can detect the ad-hoc location in specified type character string not to be length be the fixed value of third value, and detects that the first image is tampered.
Step 209, receiving device utilizes message digest algorithm to carry out Hash computing to the first image and specified type character string, obtains the second informative abstract value.
Wherein, the message digest algorithm that receiving device configures is identical with the message digest algorithm that sending ending equipment configures, and this message digest algorithm includes but not limited to: MD5 algorithm, SHA1, MAC algorithm etc.
Step 210, based on first information digest value and the second informative abstract value, if first information digest value is different with the second informative abstract value, then receiving device detects that the first image is tampered; If first information digest value is identical with the second informative abstract value, then receiving device detects that the first image is not tampered.
Wherein, for above-mentioned steps 206-step 210, corresponding handling process can be as shown in Figure 4.
Based on technique scheme, compared with prior art, the embodiment of the present invention at least has the following advantages: in the embodiment of the present invention, by informative abstract value is added in image, make assailant after intercepting and capturing comprise the image of informative abstract value, informative abstract value and image cannot be isolated, even if assailant distorts image, and obtain informative abstract value corresponding to the image after distorting, also the informative abstract value comprised in image cannot be replaced with the informative abstract value that assailant obtains, thus the informative abstract value making receiving device can calculate based on self accurately detects whether image is tampered, avoid the testing result of mistake, ensure the image integrity in image forensics process and image's authenticity.Further, sending ending equipment is by using specified type character string computing information digest value, and by cryptographic algorithm, specified type character string is encrypted, make assailant after intercepting and capturing comprise the image of informative abstract value, because specified type character string is transmitted with the form of ciphertext, therefore the specified type character string after deciphering cannot be obtained, also specified type character string computing information digest value cannot just be used, thus cause assailant cannot obtain the informative abstract value of corresponding specified type character string, when receiving device uses specified type character string computing information digest value, accurately can detect whether image is tampered, ensure the image integrity in image forensics process and image's authenticity.Further, sending ending equipment is before transmission second image, that the second image that with the addition of informative abstract value and the specified type character string after encrypting is stored in sending ending equipment, now, even if user distorts the second image stored in sending ending equipment, then receiving device also accurately can detect after receiving the second image whether image is tampered, thus ensures the image integrity in image forensics process and image's authenticity.
Embodiment three
Propose a kind of safe active distorted image detection method in the embodiment of the present invention three, the method can be applied in the system comprising sending ending equipment and receiving device.Wherein, sending ending equipment refers to the equipment sending image, and receiving device refers to and receives image and equipment image being carried out to integrity detection.Under a kind of embody rule scene, sending ending equipment can be terminal equipment, and receiving device can be application server.
In the embodiment of the present invention, the image of indication specifically includes but not limited to the image that the aware application of terminal equipment produces, such as, the report image that can produce for environmental pollution report application, public arena management application produce managing image, accident take pictures forensic applications produce photograph image etc.
It should be noted that digital image evidence collecting technology has become advanced subject both domestic and external, there is Important Academic and be worth and social effect.Digital image evidence collecting technology is divided into passive type digital image evidence collecting technology and active mode digital image forensic technologies.Passive type digital image evidence collecting technology is by the analysis to image statistics, judges the authenticity and integrity of digital image content.Active mode digital image forensic technologies utilizes to be embedded in additional information in digital picture in advance to verify the authenticity and integrity of digital image content.The application scenarios that the embodiment of the present invention is suitable for is the distorted image detection method based on active mode digital image forensic technologies.
Based on above-mentioned application scenarios, as shown in Figure 5, the active distorted image detection method of this safety can comprise the following steps:
Step 501, sending ending equipment obtains the first image, and generates specified type character string.
Such as, when evidence obtaining is taken pictures in environmental pollution report application to contamination phenomenon, this environmental pollution report application can produce report image, and this report image is photograph image.Based on the photograph image that this environmental pollution report application produces, sending ending equipment can obtain this photograph image.In the embodiment of the present invention, image aware application produced is called the first image, and sending ending equipment can obtain this first image.
Wherein, sending ending equipment is after acquisition first image, specified type character string can be generated, this specified type character string can be binary type character string, and the length of this binary type character string can be arranged according to practical experience, such as, the length of binary type character string can be 16.
For multiple first images that sending ending equipment obtains, the specified type character string of generation can be identical, also can be different, as can be stochastic generation length be the binary type character string of the first numerical value.
Step 502, sending ending equipment utilizes message digest algorithm to carry out Hash computing to the first image and specified type character string, obtains first information digest value.Wherein, message digest algorithm can be configured according to practical experience, and the message digest algorithm that sending ending equipment configures is identical with the message digest algorithm that receiving device configures.This message digest algorithm specifically includes but not limited to: MD5 algorithm, SHA1, MAC algorithm etc.
In the embodiment of the present invention, sending ending equipment carries out Hash computing to the first image and specified type character string utilizing MD5 algorithm, obtain in the process of first information digest value, the binary type character string shifting combination of the first image and 16 is bit stream by sending ending equipment, it can be used as the input value of MD5 algorithm, obtain first information digest value, this first information digest value can be the informative abstract value of 128.
Step 503, sending ending equipment utilizes cryptographic algorithm to be encrypted specified type character string, obtains the specified type character string after encrypting.Wherein, cryptographic algorithm can be configured according to practical experience, and for the cryptographic algorithm that sending ending equipment configures, receiving device is configured with the decipherment algorithm of this cryptographic algorithm.
Such as, this cryptographic algorithm can be RSA, and this RSA comprises public-key cryptography and privacy key.Sending ending equipment is configured with the public-key cryptography of RSA, and sending ending equipment can utilize the disclosure double secret key specified type character string (the binary type character strings as 16) to be encrypted, and obtains the specified type character string after encrypting.Further, receiving device is configured with the privacy key of RSA, receiving device can utilize this privacy key to be decrypted process to the specified type character string after encryption, obtains the specified type character string (the binary type character strings as 16) utilized before public key encryption process.
In the embodiment of the present invention, sending ending equipment is encrypted specified type character string utilizing cryptographic algorithm, after obtaining the specified type character string after encrypting, can also delete specified type character string.
Step 504, the specified type character string (obtaining in step 503) after first information digest value (obtaining in step 502) and encryption is added in the first image by sending ending equipment, obtains the second image.
Step 505, sending ending equipment determination first information digest value and the positional information of specified type character string in the second image after encrypting, and this positional information is added in the second image.
Wherein, a kind of form of the second image is as shown in table 1, after first information digest value and the specified type character string after encrypting are positioned at the first image, and first information digest value and the positional information of specified type character string in the second image after encrypting are the length of first information digest value and the specified type character string after encrypting, after this positional information is positioned at the specified type character string after encryption, if positional information is afterbody 4.
Table 1
First image First information digest value Specified type character string after encryption Positional information
Step 506, the second image is sent to receiving device by sending ending equipment.Afterwards, utilize first information digest value and the specified type character string after encrypting to detect the first image by receiving device whether to be tampered.
In image transmitting process, usually can comprise control section and image section.In prior art, add informative abstract value to control section, add the first image to image section.Based on this, assailant can separate out informative abstract value from control section Directly solution.In the embodiment of the present invention, specified type character string after first information digest value, encryption and positional information (as length information) are added in the first image by sending ending equipment, namely image section is added to, now image section comprise the first image, first information digest value, encryption after specified type character string and positional information, instead of by first information digest value, encryption after specified type character string and positional information add control section to.Based on this, assailant cannot separate out the specified type character string after first information digest value and encryption from control section Directly solution.Transmit by the specified type character string after first information digest value, encryption and positional information are dissolved in image, thus greatly easy transmission complexity, because the length of the specified type character string after first information digest value, encryption and positional information is relative to very little the first image, therefore can not impact image, conceal the specified type character string after informative abstract value and encryption so to a certain extent, improve fail safe during image transmitting.
Step 507, receiving device receives the second image from sending ending equipment, positional information (position of first information digest value and the specified type character string after encrypting) is parsed from the second image, specified type character string after utilizing this positional information to parse first information digest value and encryption from the second image, determines that the content outside the specified type character string after positional information, first information digest value and encryption is the first image.
Receiving device, after obtaining the second image, first reads the afterbody 4 of the second image, and the value of this afterbody 4 represents the total length n of first information digest value and the specified type character string after encrypting.Supposing that the total length of the second image is m, is then the first image from 0 to the content of (m-n-4).Further, because first information digest value is 128, therefore, from (m-n-4) to the content of (m-n-4+128) be first information digest value, from (m-n-4+128) to the content of (m-4) be encryption after specified type character string.
Step 508, the decipherment algorithm that receiving device utilizes cryptographic algorithm corresponding is decrypted process to the specified type character string after encryption, obtain specified type character string, and utilize message digest algorithm to carry out Hash computing to the first image and specified type character string, obtain the second informative abstract value.
Wherein, cryptographic algorithm refers to the cryptographic algorithm of sending ending equipment for being encrypted specified type character string, and such as, cryptographic algorithm can be RSA.Based on this, receiving device is configured with the privacy key of RSA, receiving device can utilize this privacy key to be decrypted process to the specified type character string after encryption, obtains sending ending equipment and utilizes specified type character string before public key encryption process.Further, the message digest algorithm that receiving device configures is identical with the message digest algorithm that sending ending equipment configures, and this message digest algorithm specifically can include but not limited to: MD5 algorithm, SHA1, MAC algorithm etc.
Step 509, based on first information digest value and the second informative abstract value, if first information digest value is different with the second informative abstract value, then receiving device detects that the first image is tampered; If first information digest value is identical with the second informative abstract value, then receiving device detects that the first image is not tampered.
Based on technique scheme, compared with prior art, the embodiment of the present invention at least has the following advantages: in the embodiment of the present invention, by informative abstract value is added in image, make assailant after intercepting and capturing comprise the image of informative abstract value, informative abstract value and image cannot be isolated, even if assailant distorts image, and obtain informative abstract value corresponding to the image after distorting, also the informative abstract value comprised in image cannot be replaced with the informative abstract value that assailant obtains, thus the informative abstract value making receiving device can calculate based on self accurately detects whether image is tampered, avoid the testing result of mistake, ensure the image integrity in image forensics process and image's authenticity.Further, sending ending equipment is by using specified type character string computing information digest value, and by cryptographic algorithm, specified type character string is encrypted, make assailant after intercepting and capturing comprise the image of informative abstract value, because specified type character string is transmitted with the form of ciphertext, therefore the specified type character string after deciphering cannot be obtained, also specified type character string computing information digest value cannot just be used, thus cause assailant cannot obtain the informative abstract value of corresponding specified type character string, when receiving device uses specified type character string computing information digest value, accurately can detect whether image is tampered, ensure the image integrity in image forensics process and image's authenticity.Further, sending ending equipment is before transmission second image, that the second image that with the addition of informative abstract value and the specified type character string after encrypting is stored in sending ending equipment, now, even if user distorts the second image stored in sending ending equipment, then receiving device also accurately can detect after receiving the second image whether image is tampered, thus ensures the image integrity in image forensics process and image's authenticity.
Embodiment four
Based on the inventive concept same with said method, additionally provide a kind of sending ending equipment in the embodiment of the present invention, as shown in Figure 6, described sending ending equipment specifically comprises:
Generation module 11, for obtaining the first image, and generates specified type character string;
Obtaining module 12, for utilizing message digest algorithm to carry out Hash computing to described first image and described specified type character string, obtaining first information digest value; And utilize cryptographic algorithm to be encrypted described specified type character string, obtain the specified type character string after encrypting;
Processing module 13, for the specified type character string after described first information digest value and described encryption being added in described first image, obtains the second image;
Sending module 14, for sending to receiving device by described second image; Utilize first information digest value and the specified type character string after encrypting to detect the first image by receiving device whether to be tampered.
The length of described specified type character string is the first numerical value, described generation module 11, specifically in the process generating specified type character string, generating length is the random value of second value, and obtain the fixed value that length pre-configured on described sending ending equipment is third value, and the fixed value that the random value utilizing described length to be second value and described length are third value generates the specified type character string that length is the first numerical value; Wherein, described second value and described third value sum are described first numerical value;
Described processing module 13, also for after adding the specified type character string after described first information digest value and described encryption to described first image, before described second image is sent to receiving device, determine the positional information of specified type character string in described second image after described first information digest value and encryption, and described positional information is added in described second image.
Wherein, the modules of apparatus of the present invention can be integrated in one, and also can be separated deployment.Above-mentioned module can merge into a module, also can split into multiple submodule further.
Embodiment five
Based on the inventive concept same with said method, additionally provide a kind of receiving device in the embodiment of the present invention, as shown in Figure 7, described receiving device specifically comprises:
Receiver module 21, for receiving the second image from sending ending equipment; Specified type character string after the encryption that described second image comprises the first image, the first information digest value that described sending ending equipment obtains after utilizing message digest algorithm to carry out Hash computing to the first image and specified type character string, described sending ending equipment obtain after utilizing cryptographic algorithm to be encrypted described specified type character string;
Parsing module 22, for parsing the specified type character string after described first image, described first information digest value, described encryption from described second image;
Obtain module 23, for utilizing decipherment algorithm corresponding to described cryptographic algorithm, process is decrypted to the specified type character string after described encryption, obtain specified type character string, and utilize described message digest algorithm to carry out Hash computing to described first image and described specified type character string, obtain the second informative abstract value;
Detection module 24, if different with described second informative abstract value for described first information digest value, then detects that described first image is tampered; If described first information digest value is identical with described second informative abstract value, then detect that described first image is not tampered.
Described acquisition module 23, specifically for after obtaining specified type character string, before obtaining the second informative abstract value, obtain the fixed value that length pre-configured on described receiving device is third value, and whether the ad-hoc location judging described specified type character string is length is the fixed value of third value; If judged result is yes, then performs and utilize described message digest algorithm to carry out Hash computing to described first image and described specified type character string, obtain the process of the second informative abstract value; Described detection module 24, also for whether being after length is the fixed value of third value at the ad-hoc location judging described specified type character string, if judged result is no, then detects that described first image is tampered;
Described second image comprises the positional information of specified type character string in the second image after first information digest value and encryption; Described parsing module 22, specifically for the process of the specified type character string after parse described first image, described first information digest value, described encryption from described second image, described positional information is parsed from the second image, specified type character string after utilizing described positional information to parse described first information digest value and described encryption from described second image, determines that the content outside the specified type character string after described positional information, described first information digest value and described encryption is described first image.
Wherein, the modules of apparatus of the present invention can be integrated in one, and also can be separated deployment.Above-mentioned module can merge into a module, also can split into multiple submodule further.
For systems/devices embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, relevant part illustrates see the part of embodiment of the method.
It should be noted that, in this article, the such as relational terms of first and second grades and so on is only used for an entity or operation to separate with another entity or operating space, and not necessarily requires or imply the relation that there is any this reality between these entities or operation or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or equipment.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the equipment comprising described key element and also there is other identical element.
One of ordinary skill in the art will appreciate that all or part of step realized in said method execution mode is that the hardware that can carry out instruction relevant by program has come, described program can be stored in computer read/write memory medium, here the alleged storage medium obtained, as: ROM/RAM, magnetic disc, CD etc.
The foregoing is only preferred embodiment of the present invention, be not intended to limit protection scope of the present invention.All any amendments done within the spirit and principles in the present invention, equivalent replacement, improvement etc., be all included in protection scope of the present invention.

Claims (10)

1. an active distorted image detection method for safety, it is characterized in that, described method comprises:
Sending ending equipment obtains the first image, and generates specified type character string;
Described sending ending equipment utilizes message digest algorithm to carry out Hash computing to described first image and described specified type character string, obtains first information digest value; Described sending ending equipment utilizes cryptographic algorithm to be encrypted described specified type character string, obtains the specified type character string after encrypting;
Specified type character string after described first information digest value and described encryption is added in described first image by described sending ending equipment, obtains the second image;
Described second image is sent to receiving device by described sending ending equipment; Utilize first information digest value and the specified type character string after encrypting to detect the first image by receiving device whether to be tampered.
2. the method for claim 1, is characterized in that, the length of described specified type character string is the first numerical value, and described sending ending equipment generates the process of specified type character string, specifically comprises:
It is the random value of second value that described sending ending equipment generates length, and obtain the fixed value that length pre-configured on described sending ending equipment is third value, and the fixed value that the random value utilizing described length to be second value and described length are third value generates the specified type character string that length is the first numerical value;
Wherein, described second value and described third value sum are described first numerical value.
3. the method for claim 1, it is characterized in that, after described sending ending equipment adds the specified type character string after described first information digest value and described encryption to described first image, before described second image is sent to receiving device, described method comprises further:
Described sending ending equipment determines the positional information of specified type character string in described second image after described first information digest value and encryption, and described positional information is added in described second image.
4. an active distorted image detection method for safety, is characterized in that, said method comprising the steps of:
Receiving device receives the second image from sending ending equipment; Specified type character string after the encryption that described second image comprises the first image, the first information digest value that described sending ending equipment obtains after utilizing message digest algorithm to carry out Hash computing to the first image and specified type character string, described sending ending equipment obtain after utilizing cryptographic algorithm to be encrypted described specified type character string;
Described receiving device parses the specified type character string after described first image, described first information digest value, described encryption from described second image;
Described receiving device utilizes decipherment algorithm corresponding to described cryptographic algorithm to be decrypted process to the specified type character string after described encryption, obtain specified type character string, and utilize described message digest algorithm to carry out Hash computing to described first image and described specified type character string, obtain the second informative abstract value;
If described first information digest value is different with described second informative abstract value, then described receiving device detects that described first image is tampered; If described first information digest value is identical with described second informative abstract value, then described receiving device detects that described first image is not tampered.
5. method as claimed in claim 4, it is characterized in that, after described receiving device obtains specified type character string, before obtaining the second informative abstract value, described method comprises further:
Described receiving device obtains the fixed value that length pre-configured on described receiving device is third value, and whether the ad-hoc location judging described specified type character string is length is the fixed value of third value;
If so, then described receiving device performs and utilizes described message digest algorithm to carry out Hash computing to described first image and described specified type character string, obtains the process of the second informative abstract value;
If not, then described receiving device detects that described first image is tampered.
6. method as claimed in claim 4, is characterized in that, also comprises the positional information of specified type character string in described second image after first information digest value and encryption in described second image;
Described receiving device parses the process of the specified type character string after described first image, described first information digest value, described encryption from described second image, specifically comprises:
Described receiving device parses described positional information from described second image;
Specified type character string after described receiving device utilizes described positional information to parse described first information digest value and described encryption from described second image;
Content outside specified type character string after described receiving device determines described positional information, described first information digest value and described encryption is described first image.
7. a sending ending equipment, is characterized in that, described sending ending equipment specifically comprises:
Generation module, for obtaining the first image, and generates specified type character string;
Obtaining module, for utilizing message digest algorithm to carry out Hash computing to described first image and described specified type character string, obtaining first information digest value; And utilize cryptographic algorithm to be encrypted described specified type character string, obtain the specified type character string after encrypting;
Processing module, for the specified type character string after described first information digest value and described encryption being added in described first image, obtains the second image;
Sending module, for sending to receiving device by described second image; Utilize first information digest value and the specified type character string after encrypting to detect the first image by receiving device whether to be tampered.
8. sending ending equipment as claimed in claim 7, is characterized in that,
The length of described specified type character string is the first numerical value, described generation module, specifically in the process generating specified type character string, generating length is the random value of second value, and obtain the fixed value that length pre-configured on described sending ending equipment is third value, and the fixed value that the random value utilizing described length to be second value and described length are third value generates the specified type character string that length is the first numerical value; Wherein, described second value and described third value sum are described first numerical value;
Described processing module, also for after adding the specified type character string after described first information digest value and described encryption to described first image, before described second image is sent to receiving device, determine the positional information of specified type character string in described second image after described first information digest value and encryption, and described positional information is added in described second image.
9. a receiving device, is characterized in that, described receiving device specifically comprises:
Receiver module, for receiving the second image from sending ending equipment; Specified type character string after the encryption that described second image comprises the first image, the first information digest value that described sending ending equipment obtains after utilizing message digest algorithm to carry out Hash computing to the first image and specified type character string, described sending ending equipment obtain after utilizing cryptographic algorithm to be encrypted described specified type character string;
Parsing module, for parsing the specified type character string after described first image, described first information digest value, described encryption from described second image;
Obtain module, for utilizing decipherment algorithm corresponding to described cryptographic algorithm, process is decrypted to the specified type character string after described encryption, obtain specified type character string, and utilize described message digest algorithm to carry out Hash computing to described first image and described specified type character string, obtain the second informative abstract value;
Detection module, if different with described second informative abstract value for described first information digest value, then detects that described first image is tampered; If described first information digest value is identical with described second informative abstract value, then detect that described first image is not tampered.
10. receiving device as claimed in claim 9, is characterized in that,
Described acquisition module, specifically for after obtaining specified type character string, before obtaining the second informative abstract value, obtain the fixed value that length pre-configured on described receiving device is third value, and whether the ad-hoc location judging described specified type character string is length is the fixed value of third value; If judged result is yes, then performs and utilize described message digest algorithm to carry out Hash computing to described first image and described specified type character string, obtain the process of the second informative abstract value; Described detection module, also for whether being after length is the fixed value of third value at the ad-hoc location judging described specified type character string, if judged result is no, then detects that described first image is tampered;
Described second image comprises the positional information of specified type character string in the second image after first information digest value and encryption; Described parsing module, in process specifically for the specified type character string after parse described first image, described first information digest value, described encryption from described second image, described positional information is parsed from the second image, specified type character string after utilizing described positional information to parse described first information digest value and described encryption from described second image, determines that the content outside the specified type character string after described positional information, described first information digest value and described encryption is described first image.
CN201510329688.2A 2015-06-15 2015-06-15 A kind of safe active distorted image detection method and device Active CN104935783B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510329688.2A CN104935783B (en) 2015-06-15 2015-06-15 A kind of safe active distorted image detection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510329688.2A CN104935783B (en) 2015-06-15 2015-06-15 A kind of safe active distorted image detection method and device

Publications (2)

Publication Number Publication Date
CN104935783A true CN104935783A (en) 2015-09-23
CN104935783B CN104935783B (en) 2017-10-03

Family

ID=54122731

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510329688.2A Active CN104935783B (en) 2015-06-15 2015-06-15 A kind of safe active distorted image detection method and device

Country Status (1)

Country Link
CN (1) CN104935783B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018120459A1 (en) * 2016-12-28 2018-07-05 平安科技(深圳)有限公司 Method, apparatus and device for verifying authenticity of image, and storage medium and service end
CN108632481A (en) * 2017-03-16 2018-10-09 京瓷办公信息系统株式会社 Image forming apparatus, image forming method and recording medium
CN112291063A (en) * 2020-11-03 2021-01-29 西安万像电子科技有限公司 Image data transmission method and device and image data receiving method and device
CN113609510A (en) * 2021-09-28 2021-11-05 武汉泰乐奇信息科技有限公司 Big data encryption transmission method and device based on distributed storage

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729256A (en) * 2008-10-24 2010-06-09 深圳宝嘉电子设备有限公司 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark
CN101833742A (en) * 2010-03-30 2010-09-15 杭州电子科技大学 Three-dimensional grid model digital watermarking method based on spherical parameterization
CN102298677A (en) * 2011-08-29 2011-12-28 瑞斯康达科技发展股份有限公司 Protection method and device for stack overflow
CN103973936A (en) * 2014-02-19 2014-08-06 浙江大学 Methods for quickly encrypting and decrypting medical images in high-intensity manner

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729256A (en) * 2008-10-24 2010-06-09 深圳宝嘉电子设备有限公司 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark
CN101833742A (en) * 2010-03-30 2010-09-15 杭州电子科技大学 Three-dimensional grid model digital watermarking method based on spherical parameterization
CN102298677A (en) * 2011-08-29 2011-12-28 瑞斯康达科技发展股份有限公司 Protection method and device for stack overflow
CN103973936A (en) * 2014-02-19 2014-08-06 浙江大学 Methods for quickly encrypting and decrypting medical images in high-intensity manner

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
PING WAH WONG: "A Public Watermark for Image Verification and Authentication", 《IEEE》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018120459A1 (en) * 2016-12-28 2018-07-05 平安科技(深圳)有限公司 Method, apparatus and device for verifying authenticity of image, and storage medium and service end
CN108632481A (en) * 2017-03-16 2018-10-09 京瓷办公信息系统株式会社 Image forming apparatus, image forming method and recording medium
CN108632481B (en) * 2017-03-16 2020-03-06 京瓷办公信息系统株式会社 Image forming apparatus, image forming method, and recording medium
CN112291063A (en) * 2020-11-03 2021-01-29 西安万像电子科技有限公司 Image data transmission method and device and image data receiving method and device
CN112291063B (en) * 2020-11-03 2023-12-19 西安万像电子科技有限公司 Image data transmission method and device, and image data receiving method and device
CN113609510A (en) * 2021-09-28 2021-11-05 武汉泰乐奇信息科技有限公司 Big data encryption transmission method and device based on distributed storage
CN113609510B (en) * 2021-09-28 2021-12-24 武汉泰乐奇信息科技有限公司 Big data encryption transmission method and device based on distributed storage

Also Published As

Publication number Publication date
CN104935783B (en) 2017-10-03

Similar Documents

Publication Publication Date Title
EP2290872B1 (en) Device for generating a message authentication code for authenticating a message
US6523115B1 (en) Encryption device, decryption device, encryption method, decryption method, cryptography system, computer-readable recording medium storing encryption program, and computer-readable recording medium storing decryption program which perform error diagnosis
JP6814147B2 (en) Terminals, methods, non-volatile storage media
CN105591750A (en) Electronic signature generation method and system
US9374222B2 (en) Secure communication of data between devices
CN105245505A (en) Data transmitting method and device, data receiving method and device, and receiving-transmitting system
CN110401677B (en) Method and device for acquiring digital copyright key, storage medium and electronic equipment
CN104935783A (en) Safe and active image tampering detection method and device
WO2020115748A1 (en) Secure consensus over a limited connection
CN111418182B (en) Information processing apparatus, registration apparatus, information processing method, registration method, and computer program
CN102648625B (en) Method, device and system for implementing the grouping of broadcast services
US20220052856A1 (en) Method and apparatus for securing real-time data transfer from a device
CN116455572B (en) Data encryption method, device and equipment
CN105404470A (en) Data storage method, data security apparatus and data storage system
CN115344848B (en) Identification acquisition method, device, equipment and computer readable storage medium
CN112134685B (en) DPA attack-preventing circuit to be tested safety simulation analysis method and device
CN110474967B (en) Block chain experiment system and method
CN114422209A (en) Data processing method, device and storage medium
CN114091072A (en) Data processing method and device
CN112954388A (en) Data file acquisition method and device, terminal equipment and storage medium
CN101860435B (en) Message sending method and device, message receiving method and device as well as method and device for determining network node
CN104363584A (en) Method, device and terminal for encrypting and decrypting short message
CN113660725B (en) Positioning anti-cheating method, device and system, computer equipment and storage medium
CN113660258B (en) Method, system, medium and device for preventing file from being tampered in transmission process
Yee et al. Secret channel using video steganography

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant