CN108596820A - a kind of image processing system based on information security - Google Patents
a kind of image processing system based on information security Download PDFInfo
- Publication number
- CN108596820A CN108596820A CN201810323138.3A CN201810323138A CN108596820A CN 108596820 A CN108596820 A CN 108596820A CN 201810323138 A CN201810323138 A CN 201810323138A CN 108596820 A CN108596820 A CN 108596820A
- Authority
- CN
- China
- Prior art keywords
- image
- module
- information
- information security
- watermark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention belongs to technical field of image processing, disclose a kind of image processing system based on information security, including:Image capture module, input module, main control module, encrypting module, image-forming module, memory module, judgment module, decoder module, watermark module.The present invention provides watermark module and carries out not overlap partition by 2 × 2 pixel sizes, gray average is extracted from pending image, the gray average is defined as watermark information, since gray average is indicated by 8 binary digits, the integer part of wherein high 6 expressions gray average, the embedded watermark information from pending image zooming-out can the free from error gray average for indicating the image block, as long as there are one the data of bit to change for the watermark information part that either image information portion is still embedded in, this algorithm will will detect that the image is tampered.Image data and password combination can be improved by the safety of image viewing by encrypting module simultaneously.
Description
Technical field
The invention belongs to technical field of image processing more particularly to a kind of image processing systems based on information security.
Background technology
Information security includes mainly the content of following five aspect, i.e., need to ensure the confidentiality of information, authenticity, integrality,
The safety of unauthorised copies and institute's parasitic system.The range that information security itself includes is very big, including how taking precautions against quotient
Leakage etc. of the teenager to the browsing, personal information of flame is taken precautions against in the secret leakage of industry enterprise.Information peace under network environment
Entirety system is the key that ensure information security, including computer security operating system, various security protocols, security mechanism are (digital
Signature, message authentication, data encryption etc.), until security system, such as UniNAC, DLP, it can simply by the presence of security breaches
Threaten global safety.Information security refers to information system (including hardware, software, data, people, physical environment and its infrastructure)
It is protected, not by the reason of accidental or malice and by destroying, changing, revealing, system is continuously reliably normally run,
Information service is not interrupted, and finally realizes business continuance.If being not easy to find however, existing image is tampered, lead to figure
As the risk propagated;Image is transferred out of storage device simultaneously, then anyone can watch image, and the privacy of user does not have
It is protected completely.
In conclusion problem of the existing technology is:It is not easy to find if existing image is tampered, leads to image
The risk of propagation;Image is transferred out of storage device simultaneously, then anyone can watch image, and the privacy of user does not have
To complete protection.
Invention content
In view of the problems of the existing technology, the present invention provides a kind of image processing systems based on information security.
The invention is realized in this way a kind of image processing system based on information security includes:
Image capture module, input module, main control module, encrypting module, image-forming module, memory module, judgment module, solution
Code module, watermark module;
Image capture module is connect with main control module, for acquiring original image;
Described image acquisition module extracts the HoG features and GMM features of information security image training sample, and HoG is special
GMM features of seeking peace are combined the feature as information security image;Include the following steps:
Information security image training sample image is divided into several information security images, will be every in information security image
A pixel is transformed into YC from RGB colorbCrColor space, and extract its Cb、CrThe value of chromatic component;Wherein, Y is indicated bright
Spend component, CbIndicate chroma blue component, CrIndicate red chrominance component;
Information security image is divided into the small image block of U non-overlapping copies, finds out each small image block respectively in Cb、CrColor
Spend the mean vector on component:These mean vectors are substituted into the GMM that step (2) trains respectively
Information security color of image model obtains each small image block each Gaussian component ω in GMM modeliGi(i∈{1,2,…,
K }) on value the color characteristic of U small image blocks is joined together to be denoted as the color characteristic of the small image block
Information security image training sample image is converted into gray level image, Gamma corrections are carried out to input picture;
Calculate the horizontally and vertically Grad g of each pixel (x, y) in gray level imagex(x, y) and gy(x,
y);
gx(x, y)=I (x+1, y)-I (x-1, y)
gy(x, y)=I (x, y+1)-I (x, y-1)
In formula, I (x, y) indicates the gray value at pixel (x, y), calculates the gradient at pixel (x, y) according to the following formula
Amplitude g (x, y) and direction α (x, y);
The gray level image of information security image training sample is divided into information security image, counts each information security figure
As upper histogram of gradients, the shape information for describing target;
To each information security image using the histogram of 9 bin come the gradient of pixel in statistical information safety image
The gradient magnitude of pixel in each bin is carried out the cumulative histogram of gradients for forming the information security image by information, with 9 dimensions
Feature vector indicates, is denoted as h1=[f1,f2,…,f9], wherein fiFor the gradient accumulated value of i-th of bin;
The gradient eigenvector h combined1With obtain color feature vector h2, form information security image feature to
Measure [h1,h2];
The combination of information security image is blocking, and normalized in block;
Input module is connect with main control module, for inputting user's operation pictorial information;
Main control module, with image capture module, input module, encrypting module, memory module, judgment module, watermark module
Connection, for controlling modules normal work;
The information security image stitching line of the main control module is specifically wrapped using the method blocked across overlapping region is eliminated
It includes:
1) use the method for Threshold segmentation that information security image is divided into two parts, high magnitude area and low amounts value area, threshold value
Cost criterion is defined such as formula (2) (3):
Wherein be cost (the error hiding metric matrix that formula (1) acquires, δ T] be image segmentation threshold, wherein TI attaches most importance to
The maximum error hiding magnitude in folded region is Fixed constant, δ ∈ (0;ForBinaryzation matrix;
2) judge the beginning and end of suture whether in low amounts value area (Tcost_b=0) and positioned at same connection point
Amount judges to whether there is a paths between starting and terminal point;If being not present, indicate in figure there are one or more across overlapping region
Block;Blocking across overlapping region is searched, and gradually reduces the magnitude of this occlusion area, until there is no across overlapping region
It blocks, beginning and end is made to be located in same connected component;Connected region where starting and terminal point at this time, that is, the suture solved
Minimum connected domain;
Encrypting module is connect with main control module, for picture to be encrypted;
Image-forming module is connect with encrypting module, for generating encryption picture after image ciphering;
Memory module is connect with main control module, for being stored to encryption picture;
Judgment module is connect with main control module, for believing picture operation information input by user and encrypting module encryption
Breath carries out matching judgment, opens picture by decoder module if consistent, otherwise can not open;
Decoder module is connect with judgment module, is used for according to judgment module judging result, if unanimously, decrypting picture;
Watermark module is connect with main control module, for carrying out embedding watermarking to picture.
Further, the watermark module embedding grammar is as follows:
First, not overlap partition is carried out by 2 × 2 pixel sizes to pending image, obtains several sub-blocks, calculate sub-block
The gray average is defined as watermark information by the gray average of middle all pixels;According to first key, reflected using logistic
The the first pseudorandom binary sequence for penetrating generation is encrypted the watermark information to obtain watermark information to be embedded;
Secondly, according to the second key, the second pseudorandom binary sequence generated using logistic mappings is to the watermark
The bit plane of insertion of the information on the pending image, which is encrypted to obtain, encrypts embedded bit plane;
Then, the watermark information to be embedded is embedded into the pending image according to the embedded bit plane of the encryption
Obtain embedded watermark;
Then, it according to third key, carries out chaos iteration operation and generates chaos real value sequence, by the chaos real value sequence
It is divided into the identical not overlapping partition of multiple sizes, the chaos real value sequence of each subregion is ranked up to obtain ordered sequence,
Position Number of each of chaos real value sequence according to each subregion value in the ordered sequence obtains the embedded ground of displacement
Location;The embedded watermark is obtained into displacement watermark into line replacement according to the embedded address of displacement;
Finally, as unit of subregion, a subregion containing displacement watermark is exchanged with another subregion;It will exchange
Displacement watermark be embedded into pending image.
Advantages of the present invention and good effect are:The present invention provides watermark module and is not overlapped point by 2 × 2 pixel sizes
Block extracts gray average from pending image, which is defined as watermark information, since gray average is by 8 two
System position indicates, wherein the integer part of high 6 expressions gray average, the fractional part of last 2 expressions gray value.Even only
There is 1bit information to be tampered, can detected and accomplishes being accurately positioned for tampered region.It is embedded in from pending image zooming-out
Watermark information can it is free from error indicate the image block gray average, the watermark that either image information portion is still embedded in
As long as there are one the data of bit to change for message part, this algorithm will will detect that the image is tampered.Simultaneously by encrypting mould
Image data and password combination can be improved the safety of image viewing by block.
Description of the drawings
Fig. 1 is the image processing system block diagram provided in an embodiment of the present invention based on information security.
In figure:1, image capture module;2, input module;3, main control module;4, encrypting module;5, image-forming module;6, it deposits
Store up module;7, judgment module;8, decoder module;9, watermark module.
Specific implementation mode
In order to further understand the content, features and effects of the present invention, the following examples are hereby given, and coordinate attached drawing
Detailed description are as follows.
The structure of the present invention is explained in detail below in conjunction with the accompanying drawings.
As shown in Figure 1, the image processing system provided by the invention based on information security includes:It is image capture module 1, defeated
Enter module 2, main control module 3, encrypting module 4, image-forming module 5, memory module 6, judgment module 7, decoder module 8, watermark module
9。
Image capture module 1 is connect with main control module 3, for acquiring original image;
Input module 2 is connect with main control module 3, for inputting user's operation pictorial information;
Main control module 3, with image capture module 1, input module 2, encrypting module 4, memory module 6, judgment module 7, water
Impression block 9 connects, for controlling modules normal work;
Encrypting module 4 is connect with main control module 3, for picture to be encrypted;
Image-forming module 5 is connect with encrypting module 4, for generating encryption picture after image ciphering;
Memory module 6 is connect with main control module 3, for being stored to encryption picture;
Judgment module 7 is connect with main control module 3, for being encrypted to picture operation information input by user and encrypting module 4
Information carries out matching judgment, opens picture by decoder module 8 if consistent, otherwise can not open;
Decoder module 8 is connect with judgment module 7, is used for according to 7 judging result of judgment module, if unanimously, decrypting figure
Piece;
Watermark module 9 is connect with main control module 3, for carrying out embedding watermarking to picture.
Described image acquisition module extracts the HoG features and GMM features of information security image training sample, and HoG is special
GMM features of seeking peace are combined the feature as information security image;Include the following steps:
Information security image training sample image is divided into several information security images, will be every in information security image
A pixel is transformed into YC from RGB colorbCrColor space, and extract its Cb、CrThe value of chromatic component;Wherein, Y is indicated bright
Spend component, CbIndicate chroma blue component, CrIndicate red chrominance component;
Information security image is divided into the small image block of U non-overlapping copies, finds out each small image block respectively in Cb、CrColor
Spend the mean vector on component:These mean vectors are substituted into the GMM that step (2) trains respectively
Information security color of image model obtains each small image block each Gaussian component ω in GMM modeliGi(i∈{1,2,…,
K }) on value the color characteristic of U small image blocks is joined together to be denoted as the color characteristic of the small image block
Information security image training sample image is converted into gray level image, Gamma corrections are carried out to input picture;
Calculate the horizontally and vertically Grad g of each pixel (x, y) in gray level imagex(x, y) and gy(x,
y);
gx(x, y)=I (x+1, y)-I (x-1, y)
gy(x, y)=I (x, y+1)-I (x, y-1)
In formula, I (x, y) indicates the gray value at pixel (x, y), calculates the gradient at pixel (x, y) according to the following formula
Amplitude g (x, y) and direction α (x, y);
The gray level image of information security image training sample is divided into information security image, counts each information security figure
As upper histogram of gradients, the shape information for describing target;
To each information security image using the histogram of 9 bin come the gradient of pixel in statistical information safety image
The gradient magnitude of pixel in each bin is carried out the cumulative histogram of gradients for forming the information security image by information, with 9 dimensions
Feature vector indicates, is denoted as h1=[f1,f2,…,f9], wherein fiFor the gradient accumulated value of i-th of bin;
The gradient eigenvector h combined1With obtain color feature vector h2, form information security image feature to
Measure [h1,h2];
The combination of information security image is blocking, and normalized in block;
The information security image stitching line of the main control module is specifically wrapped using the method blocked across overlapping region is eliminated
It includes:
1) use the method for Threshold segmentation that information security image is divided into two parts, high magnitude area and low amounts value area, threshold value
Cost criterion is defined such as formula (2) (3):
Wherein be cost (the error hiding metric matrix that formula (1) acquires, δ T] be image segmentation threshold, wherein T] attach most importance to
The maximum error hiding magnitude in folded region is Fixed constant, δ ∈ (0;ForBinaryzation matrix;
2) judge the beginning and end of suture whether in low amounts value area (Tcost_b=0) and positioned at same connection point
Amount judges to whether there is a paths between starting and terminal point;If being not present, indicate in figure there are one or more across overlapping region
Block;Blocking across overlapping region is searched, and gradually reduces the magnitude of this occlusion area, until there is no across overlapping region
It blocks, beginning and end is made to be located in same connected component;Connected region where starting and terminal point at this time, that is, the suture solved
Minimum connected domain.
9 embedding grammar of watermark module provided by the invention is as follows:
First, not overlap partition is carried out by 2 × 2 pixel sizes to pending image, obtains several sub-blocks, calculate sub-block
The gray average is defined as watermark information by the gray average of middle all pixels;According to first key, reflected using logistic
The the first pseudorandom binary sequence for penetrating generation is encrypted the watermark information to obtain watermark information to be embedded;
Secondly, according to the second key, the second pseudorandom binary sequence generated using logistic mappings is to the watermark
The bit plane of insertion of the information on the pending image, which is encrypted to obtain, encrypts embedded bit plane;
Then, the watermark information to be embedded is embedded into the pending image according to the embedded bit plane of the encryption
Obtain embedded watermark;
Then, it according to third key, carries out chaos iteration operation and generates chaos real value sequence, by the chaos real value sequence
It is divided into the identical not overlapping partition of multiple sizes, the chaos real value sequence of each subregion is ranked up to obtain ordered sequence,
Position Number of each of chaos real value sequence according to each subregion value in the ordered sequence obtains the embedded ground of displacement
Location;The embedded watermark is obtained into displacement watermark into line replacement according to the embedded address of displacement;
Finally, as unit of subregion, a subregion containing displacement watermark is exchanged with another subregion;It will exchange
Displacement watermark be embedded into pending image.
When present invention processing, original image is acquired by image capture module 1;Main control module 3 transfers encrypting module 4 to figure
Piece is encrypted;Then, by image-forming module 5 to generating encryption picture after image ciphering;By memory module 6 to encrypting picture
It is stored;User inputs user's operation pictorial information by input module 2;It is defeated to user that main control module 3 transfers judgment module 7
The picture operation information entered carries out matching judgment with 4 encryption information of encrypting module, is opened and is schemed by decoder module 8 if consistent
Otherwise piece can not be opened;Embedding watermarking is carried out to picture by watermark module 9.
The above is only the preferred embodiments of the present invention, and is not intended to limit the present invention in any form,
Every any simple modification made to the above embodiment according to the technical essence of the invention, equivalent variations and modification, belong to
In the range of technical solution of the present invention.
Claims (2)
1. a kind of image processing system based on information security, which is characterized in that the image procossing system based on information security
System includes:
Image capture module, input module, main control module, encrypting module, image-forming module, memory module, judgment module, decoding mould
Block, watermark module;
Image capture module is connect with main control module, for acquiring original image;
Described image acquisition module extracts the HoG features and GMM features of information security image training sample, and by HoG features and
GMM features are combined the feature as information security image;Include the following steps:
Information security image training sample image is divided into several information security images, by each picture in information security image
Element is transformed into YC from RGB colorbCrColor space, and extract its Cb、CrThe value of chromatic component;Wherein, Y indicates brightness point
Amount, CbIndicate chroma blue component, CrIndicate red chrominance component;
Information security image is divided into the small image block of U non-overlapping copies, finds out each small image block respectively in Cb、CrColoration point
Mean vector in amount:These mean vectors are substituted into the GMM information that step (2) trains respectively
Safety image color model obtains each small image block each Gaussian component ω in GMM modeliGi(i ∈ 1,2 ..., K }) on
Value the color characteristic of U small image blocks is joined together to be denoted as the color characteristic of the small image block
Information security image training sample image is converted into gray level image, Gamma corrections are carried out to input picture;
Calculate the horizontally and vertically Grad g of each pixel (x, y) in gray level imagex(x, y) and gy(x,y);
gx(x, y)=I (x+1, y)-I (x-1, y)
gy(x, y)=I (x, y+1)-I (x, y-1)
In formula, I (x, y) indicates the gray value at pixel (x, y), calculates the gradient magnitude g at pixel (x, y) according to the following formula
(x, y) and direction α (x, y);
The gray level image of information security image training sample is divided into information security image, is counted on each information security image
Histogram of gradients, the shape information for describing target;
To each information security image using the histogram of 9 bin come the gradient information of pixel in statistical information safety image,
The gradient magnitude of pixel in each bin is subjected to the cumulative histogram of gradients for forming the information security image, with 9 dimensional features to
It measures to indicate, is denoted as h1=[f1,f2,…,f9], wherein fiFor the gradient accumulated value of i-th of bin;
The gradient eigenvector h combined1With obtain color feature vector h2, form the feature vector of information security image
[h1,h2];
The combination of information security image is blocking, and normalized in block;
Input module is connect with main control module, for inputting user's operation pictorial information;
Main control module is connect with image capture module, input module, encrypting module, memory module, judgment module, watermark module,
For controlling modules normal work;
The information security image stitching line of the main control module is specifically included using the method blocked across overlapping region is eliminated:
1) use the method for Threshold segmentation that information security image is divided into two parts, high magnitude area and low amounts value area, threshold cost
Rule definition such as formula (2) (3):
Wherein be cost (the error hiding metric matrix that formula (1) acquires, δ T] be image segmentation threshold, wherein T1 be overlay region
The maximum error hiding magnitude in domain is Fixed constant, δ ∈ (0;ForBinaryzation matrix;
2) judge the beginning and end of suture whether in low amounts value area (Tcost_b=0) and positioned at same connected component, i.e.,
Judge to whether there is a paths between starting and terminal point;If being not present, indicate figure in there are one or more across overlapping region screening
Gear;Blocking across overlapping region is searched, and gradually reduces the magnitude of this occlusion area, until there is no the screenings across overlapping region
Gear, makes beginning and end be located in same connected component;Connected region where starting and terminal point at this time, that is, the suture solved is most
Small connected domain;
Encrypting module is connect with main control module, for picture to be encrypted;
Image-forming module is connect with encrypting module, for generating encryption picture after image ciphering;
Memory module is connect with main control module, for being stored to encryption picture;
Judgment module is connect with main control module, for picture operation information input by user and encrypting module encryption information into
Row matching judgment is opened picture by decoder module if consistent, otherwise can not be opened;
Decoder module is connect with judgment module, is used for according to judgment module judging result, if unanimously, decrypting picture;
Watermark module is connect with main control module, for carrying out embedding watermarking to picture.
2. the image processing system based on information security as described in claim 1, which is characterized in that the watermark module insertion side
Method is as follows:
First, not overlap partition is carried out by 2 × 2 pixel sizes to pending image, obtains several sub-blocks, calculate institute in sub-block
The gray average is defined as watermark information by the gray average for having pixel;According to first key, is mapped and produced using logistic
The first raw pseudorandom binary sequence is encrypted the watermark information to obtain watermark information to be embedded;
Secondly, according to the second key, the second pseudorandom binary sequence generated using logistic mappings is to the watermark information
The bit plane of insertion on the pending image, which is encrypted to obtain, encrypts embedded bit plane;
Then, the watermark information to be embedded is embedded into the pending image according to the embedded bit plane of the encryption and is obtained
Embedded watermark;
Then, it according to third key, carries out chaos iteration operation and generates chaos real value sequence, the chaos real value sequence is divided
For the identical not overlapping partition of multiple sizes, the chaos real value sequence of each subregion is ranked up to obtain ordered sequence, according to
Position Number of each of chaos real value sequence of each subregion value in the ordered sequence obtains the embedded address of displacement;Root
The embedded watermark is obtained into displacement watermark into line replacement according to the embedded address of displacement;
Finally, as unit of subregion, a subregion containing displacement watermark is exchanged with another subregion;By setting for exchange
Watermark is changed to be embedded into pending image.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810323138.3A CN108596820B (en) | 2018-04-11 | 2018-04-11 | Image processing system based on information security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810323138.3A CN108596820B (en) | 2018-04-11 | 2018-04-11 | Image processing system based on information security |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108596820A true CN108596820A (en) | 2018-09-28 |
CN108596820B CN108596820B (en) | 2022-04-05 |
Family
ID=63621991
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810323138.3A Active CN108596820B (en) | 2018-04-11 | 2018-04-11 | Image processing system based on information security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108596820B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109767375A (en) * | 2018-12-06 | 2019-05-17 | 北京北信源信息安全技术有限公司 | The method and system of image watermark insertion and retrospect |
CN110232651A (en) * | 2019-06-12 | 2019-09-13 | 山东科技大学 | A kind of reversible information hidden method based on block prediction and difference histogram shifting |
CN110286813A (en) * | 2019-05-22 | 2019-09-27 | 北京达佳互联信息技术有限公司 | Picture mark position determines method and apparatus |
CN111784708A (en) * | 2020-07-03 | 2020-10-16 | 上海骏聿数码科技有限公司 | Image tamper-proof inspection method and device |
CN112529586A (en) * | 2020-12-15 | 2021-03-19 | 深圳市快付通金融网络科技服务有限公司 | Transaction information management method, device, equipment and storage medium |
CN112804502A (en) * | 2021-03-10 | 2021-05-14 | 重庆第二师范学院 | Video monitoring system, method, storage medium and device based on artificial intelligence |
CN115080931A (en) * | 2022-07-21 | 2022-09-20 | 南通东德纺织科技有限公司 | Textile image copyright protection method based on digital watermark |
CN115861034A (en) * | 2023-02-20 | 2023-03-28 | 深圳市欣博跃电子有限公司 | Wireless routing data intelligent management system |
CN117768748A (en) * | 2024-01-03 | 2024-03-26 | 北京睿航至臻科技有限公司 | Watermark processing method based on database |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103247017A (en) * | 2013-05-08 | 2013-08-14 | 江苏大学 | Mesh segmentation-based non-blind watermark realization method for three-dimensional mesh model |
KR20150002040A (en) * | 2013-06-28 | 2015-01-07 | (주) 세인 | The way of Real-time Pedestrian Recognition and Tracking using Kalman Filter and Clustering Algorithm based on Cascade Method by HOG |
CN104537600A (en) * | 2014-12-16 | 2015-04-22 | 陕西科技大学 | Secondary image encrypting and decrypting methods and watermark information tamper area positioning method |
US20160335503A1 (en) * | 2013-11-07 | 2016-11-17 | Nuctech Company Limited | Inspection methods and devices |
-
2018
- 2018-04-11 CN CN201810323138.3A patent/CN108596820B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103247017A (en) * | 2013-05-08 | 2013-08-14 | 江苏大学 | Mesh segmentation-based non-blind watermark realization method for three-dimensional mesh model |
KR20150002040A (en) * | 2013-06-28 | 2015-01-07 | (주) 세인 | The way of Real-time Pedestrian Recognition and Tracking using Kalman Filter and Clustering Algorithm based on Cascade Method by HOG |
US20160335503A1 (en) * | 2013-11-07 | 2016-11-17 | Nuctech Company Limited | Inspection methods and devices |
CN104537600A (en) * | 2014-12-16 | 2015-04-22 | 陕西科技大学 | Secondary image encrypting and decrypting methods and watermark information tamper area positioning method |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109767375A (en) * | 2018-12-06 | 2019-05-17 | 北京北信源信息安全技术有限公司 | The method and system of image watermark insertion and retrospect |
CN109767375B (en) * | 2018-12-06 | 2022-12-13 | 北京北信源信息安全技术有限公司 | Image watermark embedding and tracing method and system |
CN110286813A (en) * | 2019-05-22 | 2019-09-27 | 北京达佳互联信息技术有限公司 | Picture mark position determines method and apparatus |
US11574415B2 (en) | 2019-05-22 | 2023-02-07 | Beijing Dajia Internet Information Technology Co., Ltd. | Method and apparatus for determining an icon position |
CN110232651A (en) * | 2019-06-12 | 2019-09-13 | 山东科技大学 | A kind of reversible information hidden method based on block prediction and difference histogram shifting |
CN111784708A (en) * | 2020-07-03 | 2020-10-16 | 上海骏聿数码科技有限公司 | Image tamper-proof inspection method and device |
CN112529586B (en) * | 2020-12-15 | 2023-07-28 | 深圳市快付通金融网络科技服务有限公司 | Transaction information management method, device, equipment and storage medium |
CN112529586A (en) * | 2020-12-15 | 2021-03-19 | 深圳市快付通金融网络科技服务有限公司 | Transaction information management method, device, equipment and storage medium |
CN112804502A (en) * | 2021-03-10 | 2021-05-14 | 重庆第二师范学院 | Video monitoring system, method, storage medium and device based on artificial intelligence |
CN115080931A (en) * | 2022-07-21 | 2022-09-20 | 南通东德纺织科技有限公司 | Textile image copyright protection method based on digital watermark |
CN115861034A (en) * | 2023-02-20 | 2023-03-28 | 深圳市欣博跃电子有限公司 | Wireless routing data intelligent management system |
CN117768748A (en) * | 2024-01-03 | 2024-03-26 | 北京睿航至臻科技有限公司 | Watermark processing method based on database |
CN117768748B (en) * | 2024-01-03 | 2024-06-11 | 北京睿航至臻科技有限公司 | Watermark processing method based on database |
Also Published As
Publication number | Publication date |
---|---|
CN108596820B (en) | 2022-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108596820A (en) | a kind of image processing system based on information security | |
Korshunov et al. | Using warping for privacy protection in video surveillance | |
KR100878579B1 (en) | Watermarking Method, Watermark Validation Method, Watermarking Device and Watermark Validation Device | |
Yahya | Steganography techniques for digital images | |
US7313248B2 (en) | Steganographic image encoding | |
US20100067691A1 (en) | Document certification and authentication system | |
JP5435142B2 (en) | Image encryption system and image decryption system | |
Hsu et al. | DIGITAL WATERMARKING SCHEME FOR COPYRIGHT PROTECTION AND TAMPERING DETECTION. | |
Chhajed et al. | Applying decision tree for hiding data in binary images for secure and secret information flow | |
KR101420297B1 (en) | Method and Devices for Video Processing Rights Enforcement | |
KR101809086B1 (en) | System for Suppling and Authenticating Digital Contents using Real Time Image Watermarking Technic | |
Wang et al. | Content based authentication of visual cryptography | |
Lin et al. | Applying projection and B-spline to image authentication and remedy | |
Chowdhuri et al. | Improved data hiding capacity through repeated embedding using modified weighted matrix for color image | |
Lazarov et al. | A fragile watermarking algorithm for image tamper detection based on chaotic maps | |
Manjunatha et al. | A survey on image forgery detection techniques | |
Grusho et al. | The research of a method to identify a workplace via a monitor snapshot | |
Tsai et al. | A new repeating color watermarking scheme based on human visual model | |
Albanesi et al. | A taxonomy for image authentication techniques and its application to the current state of the art | |
Dadkhah et al. | Efficient image authentication and tamper localization algorithm using active watermarking | |
Hameed et al. | A High Quality Secure Medical Image Steganography Method | |
Bolla et al. | A two phase copyright protection scheme for digital images using visual cryptography and sampling methods | |
CN114422651B (en) | Image information hiding method, tracing method, hiding device and tracing device | |
CN109064380A (en) | A kind of 3D printing works hide watermark addition verifying system and method | |
KR102100108B1 (en) | Production system for a digital image including hidden-watermarks and system for detecting hidden-watermark |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |