CN105139335A - Image copyright identification and tampering detection system - Google Patents

Image copyright identification and tampering detection system Download PDF

Info

Publication number
CN105139335A
CN105139335A CN201510657137.9A CN201510657137A CN105139335A CN 105139335 A CN105139335 A CN 105139335A CN 201510657137 A CN201510657137 A CN 201510657137A CN 105139335 A CN105139335 A CN 105139335A
Authority
CN
China
Prior art keywords
image
watermark
digital
file
carrier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510657137.9A
Other languages
Chinese (zh)
Inventor
蒋铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201510657137.9A priority Critical patent/CN105139335A/en
Publication of CN105139335A publication Critical patent/CN105139335A/en
Pending legal-status Critical Current

Links

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses an image copyright identification and tampering detection system (also called an image archive anti-counterfeiting and distinguishing system), and belongs to the technical field of digital security. The image copyright identification and tampering detection system is a specialized product used for digital image data identification concealing and tampering detection. System software core functions include loading of a digital robust watermark (digital identification) on the image data to realize copyright identification or data concealing of the image data. Meanwhile, tampering detection and tampering positioning of the digital image data are realized by loading of a digital semi-fragile watermark. Digital image shooting instruments, such as a scanner, a high shot instrument and a quick shot instrument, are combined to perform processing of loading (digital signature) of an invisible digital watermark on the shot and scanned digital images. Meanwhile, functions of detection, extraction, tampering detection (signature verification) and tampering tracking and positioning of digital watermark information of the image of the digital signature are supported.

Description

Image copyright mark and tampering detection system
Technical field
The invention belongs to numeric security technical field, be specifically related to image copyright mark and tampering detection system.
Background technology
Constantly universal, the quick of network data of network service are shared and exchange, and Digital Content Industry is developed rapidly.But the bootlegging of digital content, distorts, the legitimate rights and interests of contents producer and consumer have been invaded in distribution.The copyright of digital content, use and control, content integrity authentication question constantly highlights.How to strengthen digital content security, prevent bootlegging and the diffusion of digital content, protecting the intellectual property is the key issue that Digital Content Industry development faces.For illegal use and the propagation of digital content, digital watermark technology arises at the historic moment.
Digital watermark technology is one and utilizes existence of redundant in multimedia messages to embed the digital content protection technology of copyright.Be mainly used in broadcast monitoring, copyright protection, digital signature, content qualification, control the fields such as copy.Watermark can be the Data Identifications such as sequence number, word, picture.Become the inseparable part of carrier data after watermark embedment bearer documents, and some operations not destroying carrier data commercial value or use value can be experienced and exist.Watermark can be divided into robust watermarking, semi-fragile watermarking and fragile watermark according to robustness.Robust watermarking is mainly used in copyrighted digital content protection, the integrated authentication of semi-fragile watermarking and fragile watermark main users digital content.
Digital picture is widely used among ecommerce, E-Government.Image Watermarking Technique at document electronic, have market application foreground widely based on the business approval field of document image, is a basic technology in Future Internet+market.Especially image technique is combined with audio and video products, can in image collection, transmission, certification etc. for the certification of document image content integrity, safety autonomous controlled in technical solution is provided.
Summary of the invention
For overcoming the deficiencies in the prior art, the invention provides image copyright mark and tampering detection system (have another name called image file false proof with Jianzhen's system), belonging to numeric security technical field.The mark that the present invention is used for Digital Image Data hides a special product with tampering detection.System software core function comprises loading by carrying out digital robust watermark (Digital ID) to view data and realizes copyright to view data or image watermarking, simultaneously by the loading realization of digital semi-fragile watermarking to the tampering detection of Digital Image Data and tampering location.System claps the digital image capture instruments such as instrument in conjunction with scanner, high bat instrument, speed, invisible digital watermark loading (digital signature) process is carried out to the digital picture of shooting scanning, support that the image to digital signature carries out the detection of digital watermark information, extraction, tampering detection (signature authentication) simultaneously, distort the functions such as tracking and location, for reaching this object, the present invention by the following technical solutions:
Image copyright mark and tampering detection system, comprise the following steps:
Digital image capture step is as follows:
Step1: select capture apparatus, selects scanner, high bat instrument, speed to clap the equipment such as instrument according to device number;
Step2: arrange acquisition parameters, comprises shooting image resolution ratio, brightness, picture-storage form etc.;
Step3: image file is set and stores name, single shooting or batch shooting.
Digital image anti-fake treatment step is as follows:
Step1: will take pictures as watermark carrier image, form comprises JPEG, TIFF etc., choose watermark file simultaneously, comprise the forms such as BMP image, text, image+word, watermark carrier file can be Internet picture, also can be formed by scanner, the high instrument captured in real-time such as instrument, speed bat instrument of clapping;
Step2: certain scope is arranged for image resolution ratio, the too small bearer documents of resolution is not suitable for digital image anti-fake process;
Step3: detect watermark capacity, watermark capacity is calculated by the resolution sizes calculating watermark carrier image, then according to the property calculation watermark information amount of watermark file, judge that watermark file whether can embed watermark carrier image, can embed, detect successfully, can not then abandon image false-proof process;
Step4: watermark capacity detects successfully, pre-service is carried out to watermark file, watermark file comprises BMP picture, text, BMP picture+text, watermark file being converted to by process can the watermark information of direct carrier, in order to watermarked security, can be encrypted watermark information, simultaneously generating watermark header information;
Step5: utilize robust watermarking technology to be embedded in watermark carrier image using watermark header information and watermark main information as Digital ID;
Step6: utilize Semi-fragile watermarking technique to be hidden in watermark carrier by watermark carrier unique characteristics (semi-fragile watermarking), is used for ensureing the integrated authentication of watermark carrier and distorting track following;
Step7: for JPEG carrier image, selects suitable quality compressibility factor compression storage figure picture, balance picture quality, image volume size, distorted image zero false drop rate etc.
Digital picture Jianzhen treatment step is as follows:
Step1: select carrier image to be checked, arranges system export file name, comprises and extracts image watermark filename, extraction Text Watermarking filename, distorted image trail file name;
Step2: judge whether image to be checked meets watermaking system requirement according to image resolution ratio size, undesirablely provides prompting, abandons watermark extracting and tampering detection;
Step3: utilize semi-fragile watermarking detection technique to detect the characteristics of image (semi-fragile watermarking) of image to be checked, if feature detection is complete or feature is consistent, then assert that picture material to be checked is complete, there is not malice and distort in prompting image, if feature detection generation area property feature detection is abnormal, then feeds back image to be checked and occur maliciously to distort;
Step4: distort if step Step3 feeds back image to be checked, mark tampered region image, stores display as distorting trace image;
Step5: distort if step Step3 feeds back image to be checked, robust watermarking technology is utilized to carry out watermark detection for there is not tampered image, detect watermark header information, extract watermark information, recover watermark file, comprise BMP image, TXT text, BMP image+TXT text.
Have employed technical method of the present invention, digital watermarking or digital signature are associated by digital anti-counterfeiting technology with digital carrier image, processed by digital picture Jianzhen and recover hiding Info in carrier image, simultaneously by hiding the state of watermark, judge that whether the carrier image content after watermark signature is true, complete, tampered image is distorted the prompting of track mark, followed the tracks of.Watermark is sightless, and detection and the extraction of watermark in addition do not need the participation of initial carrier image, belong to blind Detecting.
Accompanying drawing explanation
Fig. 1 is image copyright mark and tampering detection system construction drawing.
Fig. 2 is digital image anti-fake processing flow chart.
Fig. 3 is digital picture Jianzhen processing flow chart.
Embodiment
Technical scheme of the present invention is further illustrated by embodiment below in conjunction with accompanying drawing.
With tampering detection system, technical solution of the present invention image copyright mark comprises that digital picture obtains, digital image anti-fake process, digital picture Jianzhen process.Invention technology image copyright mark forms as shown in Figure 1 with tampering detection service system structure.Digital image anti-fake processing flow chart as shown in Figure 2.Digital picture Jianzhen processing flow chart as shown in Figure 3.
Image copyright mark and tampering detection system
In the present invention, it is a set of that system composition comprises scanner/height bat instrument/speed bat instrument equipment, and client application software is a set of, arithmetic server one (can add).
Capture apparatus mainly provides image data source, client application software primary responsibility image copyright mark and tampering detection system business function and showing interface, arithmetic server mainly comprises digital image anti-fake Processing Algorithm and digital picture Jianzhen Processing Algorithm, in practical application, algorithm can be considered directly to be carried in client software, and now system does not need arithmetic server.
First by filming instrument real-time grasp shoot one pictures, JPEG or tiff format file is stored as.
In digital image anti-fake process, first confirm that pictures taken resolution meets system image processing requirements, select BMP image as image watermark file in addition, select the TXT text being not more than 256 bytes as Text Watermarking file, guarantee that watermark file allows to be inserted in watermark carrier image file according to system watermark capacity calculation methods simultaneously.In watermark embed process, first watermark file is converted to the watermark information (comprising watermark header+watermark main information) can implementing watermarking algorithm, then according to robustness digital figure watermark algorithm embed watermark information, realize image copyright identification function, according to Semi-fragile watermarking technique, watermark carrier unique characteristics (semi-fragile watermarking) is hidden in watermark carrier, be used for realizing the integrated authentication of watermark carrier and distort track following, last according to appropriate mass compressibility factor, compression stores the digital image file after watermark loading.
In digital picture Jianzhen process, first select digital picture to be checked, arrange and extract image watermark filename, extract this paper watermark file name and distort trace image filename.Then confirm that digital image resolution to be checked meets system image processing requirements, the content integrity of image to be checked is detected according to Semi-fragile watermarking technique, if image is distorted, then label tampered image-region, returns distorted image track, if image is distorted, then extract watermark header according to Robust Digital Watermarking Algorithm, extract watermark main information according to header, recover watermark file.
Fig. 1 is the structural representation of image copyright mark and tampering detection system in the specific embodiment of the invention.As shown in Figure 1, this image copyright mark and tampering detection system comprise and high clap instrument unit 101, application terminal unit 102, arithmetic server unit 103.
High instrument unit of clapping connects application terminal by USB data line; Application terminal unit controls high instrument of clapping by application software and takes image, is connected simultaneously, submits algorithm process task to arithmetic server by Ethernet/LAN (Local Area Network) with arithmetic server unit; Arithmetic server unit is responsible for carrying digital image anti-fake Processing Algorithm and digital picture Jianzhen Processing Algorithm.
In the present invention, image copyright mark mainly comprises three parts with tampering detection system business: digital picture obtains, digital image anti-fake process, digital picture Jianzhen process.Fig. 2 is digital image anti-fake processing flow chart in the specific embodiment of the invention.Fig. 3 is digital picture Jianzhen processing flow chart in the specific embodiment of the invention.
Digital picture obtains
In the present invention, digital picture is obtained function and is produced by photographing device real-time grasp shoot image, and shoot function comprises equipment choice, the ON/OFF of video and acquisition parameters and arranges: resolution, scan size, the anglec of rotation, color, zoom in/out, correction cutting edge/go background color process, capture path, shooting style (single or batch).
Digital image anti-fake process
As shown in Figure 2, this digital image anti-fake treatment scheme comprises the following steps:
Step 201, select watermark carrier file, image watermark file, Text Watermarking file, the filename of file after false proof process is set simultaneously.
First optimum configurations is carried out before digital image anti-fake process, comprise and select watermark carrier file, watermark carrier file can be that high instrument of clapping is patted and taken the photograph file, also can be the local image file of computing machine, general format comprises JPEG and TIFF etc., select watermark file simultaneously, comprise image watermark file (BMP form), Text Watermarking file (TXT form), or image watermark file+Text Watermarking file, arrange false proof output file filename in addition, false proof output file is exactly the image file after embed watermark.
Step 202, judge the resolution sizes whether back-up system technical requirement of watermark carrier image file system process to be not suitable for for the image file that resolution is too small.
For any watermark file, first watermark carrier image needs the watermark header embedding certain capacity, therefore watermark carrier image file needs can ensure at least to hide watermark header, if the resolution of image file too small (image picture size) is not enough to hiding watermark header, then this watermark carrier image size specification does not meet system specifications, abandons process.
Step 203, judge whether watermark file information capacity can be embedded in watermark carrier image file.
For selection watermark carrier image file, the maximum watermark information capacity that this watermark carrier file can embed can be calculated according to image resolution ratio size, then according to watermark file (comprising image file, text), by system watermark file calculation of capacity formulae discovery watermark information amount of capacity, then watermark information amount of capacity corresponding to watermark file is judged whether within the maximum watermark information range of capacity of watermark carrier, meet scope then can process, do not meet area requirement and then abandon process.
Step 204, the watermark file selected in step 201 being converted to can the watermark information of direct embed watermark bearer documents.
Watermark file comprises three types, and one is image watermark; Two is Text Watermarkings; Three is sums of the two.Generate different watermark headers according to type of watermark, comprise the length of image, width, the degree of depth, the character length of text.Watermark header and watermark file itself being converted to can directly as the scale-of-two watermark information of watermark embedment.
Step 205, image multipurpose watermarking technology is utilized to embed scale-of-two watermark information.
Utilize encryption technology to the encryption of scale-of-two watermark information, to ensure the security of watermark information.System utilizes the methods such as fragmental image processing, dct transform, Relationship of Coefficients method to realize image multipurpose watermarking technology, completes the watermark of image copyright mark and loads.
Step 206, utilize Semi-fragile Image Watermarking technology embed semi-fragile watermarking information (image unique characteristics).
Utilize the methods such as fragmental image processing, dct transform, coefficient quantization method, brightness of image compensating for loss and damage method to realize Semi-fragile Image Watermarking technology, complete picture material integrated authentication and the watermark of tampering detection function loads.
Step 207, select suitable quality compressibility factor, store false proof process image file according to false proof export file name.
In order to equilibrium water watermark image quality, anti-counterfeiting image file size size, anti-counterfeiting image tampering detection zero false drop rate, select suitable picture quality compressibility factor, preserve false proof process image file according to false proof export file name, form mainly comprises JPEC, TIFF etc.
Digital picture Jianzhen processes
As shown in Figure 3, this digital picture Jianzhen treatment scheme comprises the following steps:
Step 301, selection are treated Jianzhen's image file, are arranged system export file name.
Jianzhen's image file (JPEG/TIFF form etc.) is treated in selection, system export file name is set simultaneously, comprises and extract image BMP formatted file name, extraction text TXT formatted file name, distorted image trail file name (JPEG/TIFF form etc.).
Step 302, judgement treat whether Jianzhen's image file resolution meets system specifications.System process is not suitable for for the image file that resolution is too small, reason refer step 202.
Step 303, utilize Semi-fragile watermarking technique, judge to treat whether Jianzhen's image occurred to distort.
Utilize the methods such as fragmental image processing, dct transform, coefficient quantization method to realize Semi-fragile Image Watermarking detection technique, complete picture material integrated authentication and tampering detection function watermark detection.
If step 304 step 303 judges to treat that Jianzhen's image is distorted, then label tampered image block areas, formed and distort trace image file.
For detecting the rear Jianzhen's image file distorted, utilizing the methods such as fragmental image processing, dct transform, coefficient quantization method to mark tampered image block region, being formed and distorting trace image file.
If step 305 step 303 judges to treat that Jianzhen's image is distorted, utilize multipurpose watermarking technology for detection watermark header, extract watermark main information and recover watermark file.
For the Jianzhen's image file distorted after detection, the methods such as fragmental image processing, dct transform, Relationship of Coefficients method are utilized to realize image multipurpose watermarking detection technique, detect watermark header, extract watermark main information, utilize decryption technology to decrypt scale-of-two watermark information, recover watermark file.
The above; be only the present invention's preferably embodiment, but protection scope of the present invention is not limited thereto, any people being familiar with this technology is in the technical scope disclosed by the present invention; the change that can expect easily or replacement, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection domain of claim.

Claims (3)

1. image copyright mark and tampering detection system, is characterized in that, comprise digital image capture process: digital image capture step is as follows:
Step1: select capture apparatus, selects scanner, high bat instrument, speed to clap the equipment such as instrument according to device number;
Step2: arrange acquisition parameters, comprises shooting image resolution ratio, brightness, picture-storage form etc.;
Step3: image file is set and stores name, single shooting or batch shooting.
2. image copyright mark according to claim 1 and tampering detection system, is characterized in that, also comprise digital image anti-fake processing procedure:
Digital image anti-fake treatment step is as follows:
Step1: will take pictures as watermark carrier image, form comprises JPEG, TIFF etc., choose watermark file simultaneously, comprise the forms such as BMP image, text, image+word, watermark carrier file can be Internet picture, also can be formed by scanner, the high instrument captured in real-time such as instrument, speed bat instrument of clapping;
Step2: certain scope is arranged for image resolution ratio, the too small bearer documents of resolution is not suitable for digital image anti-fake process;
Step3: detect watermark capacity, watermark capacity is calculated by the resolution sizes calculating watermark carrier image, then according to the property calculation watermark information amount of watermark file, judge that watermark file whether can embed watermark carrier image, can embed, detect successfully, can not then abandon image false-proof process;
Step4: watermark capacity detects successfully, pre-service is carried out to watermark file, watermark file comprises BMP picture, text, BMP picture+text, watermark file being converted to by process can the watermark information of direct carrier, in order to watermarked security, can be encrypted watermark information, simultaneously generating watermark header information;
Step5: utilize robust watermarking technology to be embedded in watermark carrier image using watermark header information and watermark main information as Digital ID;
Step6: utilize Semi-fragile watermarking technique to be hidden in watermark carrier by watermark carrier unique characteristics (semi-fragile watermarking), is used for ensureing the integrated authentication of watermark carrier and distorting track following;
Step7: for JPEG carrier image, selects suitable quality compressibility factor compression storage figure picture, balance picture quality, image volume size, distorted image zero false drop rate etc.
3. image copyright mark according to claim 1 and tampering detection system, is characterized in that, also comprise digital picture Jianzhen processing procedure:
Digital picture Jianzhen treatment step is as follows:
Step1: select carrier image to be checked, arranges system export file name, comprises and extracts image watermark filename, extraction Text Watermarking filename, distorted image trail file name;
Step2: judge whether image to be checked meets watermaking system requirement according to image resolution ratio size, undesirablely provides prompting, abandons watermark extracting and tampering detection;
Step3: utilize semi-fragile watermarking detection technique to detect the characteristics of image (semi-fragile watermarking) of image to be checked, if feature detection is complete or feature is consistent, then assert that picture material to be checked is complete, there is not malice and distort in prompting image, if feature detection generation area property feature detection is abnormal, then feeds back image to be checked and occur maliciously to distort;
Step4: distort if step Step3 feeds back image to be checked, mark tampered region image, stores display as distorting trace image;
Step5: distort if step Step3 feeds back image to be checked, robust watermarking technology is utilized to carry out watermark detection for there is not tampered image, detect watermark header information, extract watermark information, recover watermark file, comprise BMP image, TXT text, BMP image+TXT text.
CN201510657137.9A 2015-10-13 2015-10-13 Image copyright identification and tampering detection system Pending CN105139335A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510657137.9A CN105139335A (en) 2015-10-13 2015-10-13 Image copyright identification and tampering detection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510657137.9A CN105139335A (en) 2015-10-13 2015-10-13 Image copyright identification and tampering detection system

Publications (1)

Publication Number Publication Date
CN105139335A true CN105139335A (en) 2015-12-09

Family

ID=54724668

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510657137.9A Pending CN105139335A (en) 2015-10-13 2015-10-13 Image copyright identification and tampering detection system

Country Status (1)

Country Link
CN (1) CN105139335A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111133449A (en) * 2017-09-22 2020-05-08 真视野股份有限公司 Tamper-activated authenticatable security device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1838172A (en) * 2005-03-23 2006-09-27 北京华旗数码影像技术研究院有限责任公司 Method and apparatus for inlaying watermark in digital image and digital camera capable of adding watermark
CN101059863A (en) * 2006-04-20 2007-10-24 刘瑞祯 Embed and detection method for identifying water mark, its system and uses
CN102073980A (en) * 2011-01-06 2011-05-25 哈尔滨工程大学 Compression sensing theory-based interactive supported dual watermark generating and detecting method
CN103700059A (en) * 2013-12-19 2014-04-02 南京信息工程大学 Cloud storage image data ownership verifying method based on multifunction digital watermark

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1838172A (en) * 2005-03-23 2006-09-27 北京华旗数码影像技术研究院有限责任公司 Method and apparatus for inlaying watermark in digital image and digital camera capable of adding watermark
CN101059863A (en) * 2006-04-20 2007-10-24 刘瑞祯 Embed and detection method for identifying water mark, its system and uses
CN102073980A (en) * 2011-01-06 2011-05-25 哈尔滨工程大学 Compression sensing theory-based interactive supported dual watermark generating and detecting method
CN103700059A (en) * 2013-12-19 2014-04-02 南京信息工程大学 Cloud storage image data ownership verifying method based on multifunction digital watermark

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111133449A (en) * 2017-09-22 2020-05-08 真视野股份有限公司 Tamper-activated authenticatable security device
CN111133449B (en) * 2017-09-22 2023-12-01 真视野股份有限公司 Tamper-activated authenticatable security device

Similar Documents

Publication Publication Date Title
Voyatzis et al. The use of watermarks in the protection of digital multimedia products
US8175322B2 (en) Method of digital watermark and the corresponding device, and digital camera which can append watermark
US20100303282A1 (en) Fingerprinting a data object
Perwej et al. An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection
Katariya Digital watermarking
Guru et al. Digital watermarking classification: a survey
Dadkhah et al. Efficient digital image authentication and tamper localization technique using 3lsb watermarking
Arya et al. A review on different digital watermarking techniques
CN105139335A (en) Image copyright identification and tampering detection system
Basu et al. Bit plane index based fragile watermarking scheme for authenticating color image
Iacobici et al. Digital imaging processing and reconstruction for general applications
Tao et al. An Adaptive Method for Image Recovery in the DFT Domain.
Al-Kadei et al. Improve a secure blind watermarking technique for digital video
Abdelhedi et al. Toward a Novel LSB-based Collusion-Secure Fingerprinting Schema for 3D Video
Roberts Security camera video authentication
Dube et al. An Overview On Video Watermarking
Kavadia et al. A literature review on water marking techniques
Lin et al. An integrated watermarking technique with tamper detection and recovery
Rahaman et al. Digital Watermarking Analysis Using Data Security
Yadav et al. Comparison of SVD-Watermarking and LSB-Watermarking Techniques
Amar Toward a Novel LSB-based Collusion-Secure Fingerprinting Schema for 3D Video
JP2003304387A (en) Image management system, electronic watermark embedding device, authentication code managing device, electronic watermark detecting device, and image managing method
Wadhwa et al. A Review on Watermarking Techniques for Biometrics.
Sharma et al. Comparative Study of Data hiding in RGB Images using DWT and Hybrid DWT-SVD Watermarking Techniques
Krishna et al. The Secure Watermarking of Digital Color Images by Using a Combination of Chaotic Mapping

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20151209