CN108596820A - a kind of image processing system based on information security - Google Patents

a kind of image processing system based on information security Download PDF

Info

Publication number
CN108596820A
CN108596820A CN201810323138.3A CN201810323138A CN108596820A CN 108596820 A CN108596820 A CN 108596820A CN 201810323138 A CN201810323138 A CN 201810323138A CN 108596820 A CN108596820 A CN 108596820A
Authority
CN
China
Prior art keywords
image
module
information
information security
watermark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810323138.3A
Other languages
Chinese (zh)
Other versions
CN108596820B (en
Inventor
韦鹏程
颜蓓
李莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Education
Original Assignee
Chongqing University of Education
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Education filed Critical Chongqing University of Education
Priority to CN201810323138.3A priority Critical patent/CN108596820B/en
Publication of CN108596820A publication Critical patent/CN108596820A/en
Application granted granted Critical
Publication of CN108596820B publication Critical patent/CN108596820B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention belongs to technical field of image processing, disclose a kind of image processing system based on information security, including:Image capture module, input module, main control module, encrypting module, image-forming module, memory module, judgment module, decoder module, watermark module.The present invention provides watermark module and carries out not overlap partition by 2 × 2 pixel sizes, gray average is extracted from pending image, the gray average is defined as watermark information, since gray average is indicated by 8 binary digits, the integer part of wherein high 6 expressions gray average, the embedded watermark information from pending image zooming-out can the free from error gray average for indicating the image block, as long as there are one the data of bit to change for the watermark information part that either image information portion is still embedded in, this algorithm will will detect that the image is tampered.Image data and password combination can be improved by the safety of image viewing by encrypting module simultaneously.

Description

A kind of image processing system based on information security
Technical field
The invention belongs to technical field of image processing more particularly to a kind of image processing systems based on information security.
Background technology
Information security includes mainly the content of following five aspect, i.e., need to ensure the confidentiality of information, authenticity, integrality, The safety of unauthorised copies and institute's parasitic system.The range that information security itself includes is very big, including how taking precautions against quotient Leakage etc. of the teenager to the browsing, personal information of flame is taken precautions against in the secret leakage of industry enterprise.Information peace under network environment Entirety system is the key that ensure information security, including computer security operating system, various security protocols, security mechanism are (digital Signature, message authentication, data encryption etc.), until security system, such as UniNAC, DLP, it can simply by the presence of security breaches Threaten global safety.Information security refers to information system (including hardware, software, data, people, physical environment and its infrastructure) It is protected, not by the reason of accidental or malice and by destroying, changing, revealing, system is continuously reliably normally run, Information service is not interrupted, and finally realizes business continuance.If being not easy to find however, existing image is tampered, lead to figure As the risk propagated;Image is transferred out of storage device simultaneously, then anyone can watch image, and the privacy of user does not have It is protected completely.
In conclusion problem of the existing technology is:It is not easy to find if existing image is tampered, leads to image The risk of propagation;Image is transferred out of storage device simultaneously, then anyone can watch image, and the privacy of user does not have To complete protection.
Invention content
In view of the problems of the existing technology, the present invention provides a kind of image processing systems based on information security.
The invention is realized in this way a kind of image processing system based on information security includes:
Image capture module, input module, main control module, encrypting module, image-forming module, memory module, judgment module, solution Code module, watermark module;
Image capture module is connect with main control module, for acquiring original image;
Described image acquisition module extracts the HoG features and GMM features of information security image training sample, and HoG is special GMM features of seeking peace are combined the feature as information security image;Include the following steps:
Information security image training sample image is divided into several information security images, will be every in information security image A pixel is transformed into YC from RGB colorbCrColor space, and extract its Cb、CrThe value of chromatic component;Wherein, Y is indicated bright Spend component, CbIndicate chroma blue component, CrIndicate red chrominance component;
Information security image is divided into the small image block of U non-overlapping copies, finds out each small image block respectively in Cb、CrColor Spend the mean vector on component:These mean vectors are substituted into the GMM that step (2) trains respectively Information security color of image model obtains each small image block each Gaussian component ω in GMM modeliGi(i∈{1,2,…, K }) on value the color characteristic of U small image blocks is joined together to be denoted as the color characteristic of the small image block
Information security image training sample image is converted into gray level image, Gamma corrections are carried out to input picture;
Calculate the horizontally and vertically Grad g of each pixel (x, y) in gray level imagex(x, y) and gy(x, y);
gx(x, y)=I (x+1, y)-I (x-1, y)
gy(x, y)=I (x, y+1)-I (x, y-1)
In formula, I (x, y) indicates the gray value at pixel (x, y), calculates the gradient at pixel (x, y) according to the following formula Amplitude g (x, y) and direction α (x, y);
The gray level image of information security image training sample is divided into information security image, counts each information security figure As upper histogram of gradients, the shape information for describing target;
To each information security image using the histogram of 9 bin come the gradient of pixel in statistical information safety image The gradient magnitude of pixel in each bin is carried out the cumulative histogram of gradients for forming the information security image by information, with 9 dimensions Feature vector indicates, is denoted as h1=[f1,f2,…,f9], wherein fiFor the gradient accumulated value of i-th of bin;
The gradient eigenvector h combined1With obtain color feature vector h2, form information security image feature to Measure [h1,h2];
The combination of information security image is blocking, and normalized in block;
Input module is connect with main control module, for inputting user's operation pictorial information;
Main control module, with image capture module, input module, encrypting module, memory module, judgment module, watermark module Connection, for controlling modules normal work;
The information security image stitching line of the main control module is specifically wrapped using the method blocked across overlapping region is eliminated It includes:
1) use the method for Threshold segmentation that information security image is divided into two parts, high magnitude area and low amounts value area, threshold value Cost criterion is defined such as formula (2) (3):
Wherein be cost (the error hiding metric matrix that formula (1) acquires, δ T] be image segmentation threshold, wherein TI attaches most importance to The maximum error hiding magnitude in folded region is Fixed constant, δ ∈ (0;ForBinaryzation matrix;
2) judge the beginning and end of suture whether in low amounts value area (Tcost_b=0) and positioned at same connection point Amount judges to whether there is a paths between starting and terminal point;If being not present, indicate in figure there are one or more across overlapping region Block;Blocking across overlapping region is searched, and gradually reduces the magnitude of this occlusion area, until there is no across overlapping region It blocks, beginning and end is made to be located in same connected component;Connected region where starting and terminal point at this time, that is, the suture solved Minimum connected domain;
Encrypting module is connect with main control module, for picture to be encrypted;
Image-forming module is connect with encrypting module, for generating encryption picture after image ciphering;
Memory module is connect with main control module, for being stored to encryption picture;
Judgment module is connect with main control module, for believing picture operation information input by user and encrypting module encryption Breath carries out matching judgment, opens picture by decoder module if consistent, otherwise can not open;
Decoder module is connect with judgment module, is used for according to judgment module judging result, if unanimously, decrypting picture;
Watermark module is connect with main control module, for carrying out embedding watermarking to picture.
Further, the watermark module embedding grammar is as follows:
First, not overlap partition is carried out by 2 × 2 pixel sizes to pending image, obtains several sub-blocks, calculate sub-block The gray average is defined as watermark information by the gray average of middle all pixels;According to first key, reflected using logistic The the first pseudorandom binary sequence for penetrating generation is encrypted the watermark information to obtain watermark information to be embedded;
Secondly, according to the second key, the second pseudorandom binary sequence generated using logistic mappings is to the watermark The bit plane of insertion of the information on the pending image, which is encrypted to obtain, encrypts embedded bit plane;
Then, the watermark information to be embedded is embedded into the pending image according to the embedded bit plane of the encryption Obtain embedded watermark;
Then, it according to third key, carries out chaos iteration operation and generates chaos real value sequence, by the chaos real value sequence It is divided into the identical not overlapping partition of multiple sizes, the chaos real value sequence of each subregion is ranked up to obtain ordered sequence, Position Number of each of chaos real value sequence according to each subregion value in the ordered sequence obtains the embedded ground of displacement Location;The embedded watermark is obtained into displacement watermark into line replacement according to the embedded address of displacement;
Finally, as unit of subregion, a subregion containing displacement watermark is exchanged with another subregion;It will exchange Displacement watermark be embedded into pending image.
Advantages of the present invention and good effect are:The present invention provides watermark module and is not overlapped point by 2 × 2 pixel sizes Block extracts gray average from pending image, which is defined as watermark information, since gray average is by 8 two System position indicates, wherein the integer part of high 6 expressions gray average, the fractional part of last 2 expressions gray value.Even only There is 1bit information to be tampered, can detected and accomplishes being accurately positioned for tampered region.It is embedded in from pending image zooming-out Watermark information can it is free from error indicate the image block gray average, the watermark that either image information portion is still embedded in As long as there are one the data of bit to change for message part, this algorithm will will detect that the image is tampered.Simultaneously by encrypting mould Image data and password combination can be improved the safety of image viewing by block.
Description of the drawings
Fig. 1 is the image processing system block diagram provided in an embodiment of the present invention based on information security.
In figure:1, image capture module;2, input module;3, main control module;4, encrypting module;5, image-forming module;6, it deposits Store up module;7, judgment module;8, decoder module;9, watermark module.
Specific implementation mode
In order to further understand the content, features and effects of the present invention, the following examples are hereby given, and coordinate attached drawing Detailed description are as follows.
The structure of the present invention is explained in detail below in conjunction with the accompanying drawings.
As shown in Figure 1, the image processing system provided by the invention based on information security includes:It is image capture module 1, defeated Enter module 2, main control module 3, encrypting module 4, image-forming module 5, memory module 6, judgment module 7, decoder module 8, watermark module 9。
Image capture module 1 is connect with main control module 3, for acquiring original image;
Input module 2 is connect with main control module 3, for inputting user's operation pictorial information;
Main control module 3, with image capture module 1, input module 2, encrypting module 4, memory module 6, judgment module 7, water Impression block 9 connects, for controlling modules normal work;
Encrypting module 4 is connect with main control module 3, for picture to be encrypted;
Image-forming module 5 is connect with encrypting module 4, for generating encryption picture after image ciphering;
Memory module 6 is connect with main control module 3, for being stored to encryption picture;
Judgment module 7 is connect with main control module 3, for being encrypted to picture operation information input by user and encrypting module 4 Information carries out matching judgment, opens picture by decoder module 8 if consistent, otherwise can not open;
Decoder module 8 is connect with judgment module 7, is used for according to 7 judging result of judgment module, if unanimously, decrypting figure Piece;
Watermark module 9 is connect with main control module 3, for carrying out embedding watermarking to picture.
Described image acquisition module extracts the HoG features and GMM features of information security image training sample, and HoG is special GMM features of seeking peace are combined the feature as information security image;Include the following steps:
Information security image training sample image is divided into several information security images, will be every in information security image A pixel is transformed into YC from RGB colorbCrColor space, and extract its Cb、CrThe value of chromatic component;Wherein, Y is indicated bright Spend component, CbIndicate chroma blue component, CrIndicate red chrominance component;
Information security image is divided into the small image block of U non-overlapping copies, finds out each small image block respectively in Cb、CrColor Spend the mean vector on component:These mean vectors are substituted into the GMM that step (2) trains respectively Information security color of image model obtains each small image block each Gaussian component ω in GMM modeliGi(i∈{1,2,…, K }) on value the color characteristic of U small image blocks is joined together to be denoted as the color characteristic of the small image block
Information security image training sample image is converted into gray level image, Gamma corrections are carried out to input picture;
Calculate the horizontally and vertically Grad g of each pixel (x, y) in gray level imagex(x, y) and gy(x, y);
gx(x, y)=I (x+1, y)-I (x-1, y)
gy(x, y)=I (x, y+1)-I (x, y-1)
In formula, I (x, y) indicates the gray value at pixel (x, y), calculates the gradient at pixel (x, y) according to the following formula Amplitude g (x, y) and direction α (x, y);
The gray level image of information security image training sample is divided into information security image, counts each information security figure As upper histogram of gradients, the shape information for describing target;
To each information security image using the histogram of 9 bin come the gradient of pixel in statistical information safety image The gradient magnitude of pixel in each bin is carried out the cumulative histogram of gradients for forming the information security image by information, with 9 dimensions Feature vector indicates, is denoted as h1=[f1,f2,…,f9], wherein fiFor the gradient accumulated value of i-th of bin;
The gradient eigenvector h combined1With obtain color feature vector h2, form information security image feature to Measure [h1,h2];
The combination of information security image is blocking, and normalized in block;
The information security image stitching line of the main control module is specifically wrapped using the method blocked across overlapping region is eliminated It includes:
1) use the method for Threshold segmentation that information security image is divided into two parts, high magnitude area and low amounts value area, threshold value Cost criterion is defined such as formula (2) (3):
Wherein be cost (the error hiding metric matrix that formula (1) acquires, δ T] be image segmentation threshold, wherein T] attach most importance to The maximum error hiding magnitude in folded region is Fixed constant, δ ∈ (0;ForBinaryzation matrix;
2) judge the beginning and end of suture whether in low amounts value area (Tcost_b=0) and positioned at same connection point Amount judges to whether there is a paths between starting and terminal point;If being not present, indicate in figure there are one or more across overlapping region Block;Blocking across overlapping region is searched, and gradually reduces the magnitude of this occlusion area, until there is no across overlapping region It blocks, beginning and end is made to be located in same connected component;Connected region where starting and terminal point at this time, that is, the suture solved Minimum connected domain.
9 embedding grammar of watermark module provided by the invention is as follows:
First, not overlap partition is carried out by 2 × 2 pixel sizes to pending image, obtains several sub-blocks, calculate sub-block The gray average is defined as watermark information by the gray average of middle all pixels;According to first key, reflected using logistic The the first pseudorandom binary sequence for penetrating generation is encrypted the watermark information to obtain watermark information to be embedded;
Secondly, according to the second key, the second pseudorandom binary sequence generated using logistic mappings is to the watermark The bit plane of insertion of the information on the pending image, which is encrypted to obtain, encrypts embedded bit plane;
Then, the watermark information to be embedded is embedded into the pending image according to the embedded bit plane of the encryption Obtain embedded watermark;
Then, it according to third key, carries out chaos iteration operation and generates chaos real value sequence, by the chaos real value sequence It is divided into the identical not overlapping partition of multiple sizes, the chaos real value sequence of each subregion is ranked up to obtain ordered sequence, Position Number of each of chaos real value sequence according to each subregion value in the ordered sequence obtains the embedded ground of displacement Location;The embedded watermark is obtained into displacement watermark into line replacement according to the embedded address of displacement;
Finally, as unit of subregion, a subregion containing displacement watermark is exchanged with another subregion;It will exchange Displacement watermark be embedded into pending image.
When present invention processing, original image is acquired by image capture module 1;Main control module 3 transfers encrypting module 4 to figure Piece is encrypted;Then, by image-forming module 5 to generating encryption picture after image ciphering;By memory module 6 to encrypting picture It is stored;User inputs user's operation pictorial information by input module 2;It is defeated to user that main control module 3 transfers judgment module 7 The picture operation information entered carries out matching judgment with 4 encryption information of encrypting module, is opened and is schemed by decoder module 8 if consistent Otherwise piece can not be opened;Embedding watermarking is carried out to picture by watermark module 9.
The above is only the preferred embodiments of the present invention, and is not intended to limit the present invention in any form, Every any simple modification made to the above embodiment according to the technical essence of the invention, equivalent variations and modification, belong to In the range of technical solution of the present invention.

Claims (2)

1. a kind of image processing system based on information security, which is characterized in that the image procossing system based on information security System includes:
Image capture module, input module, main control module, encrypting module, image-forming module, memory module, judgment module, decoding mould Block, watermark module;
Image capture module is connect with main control module, for acquiring original image;
Described image acquisition module extracts the HoG features and GMM features of information security image training sample, and by HoG features and GMM features are combined the feature as information security image;Include the following steps:
Information security image training sample image is divided into several information security images, by each picture in information security image Element is transformed into YC from RGB colorbCrColor space, and extract its Cb、CrThe value of chromatic component;Wherein, Y indicates brightness point Amount, CbIndicate chroma blue component, CrIndicate red chrominance component;
Information security image is divided into the small image block of U non-overlapping copies, finds out each small image block respectively in Cb、CrColoration point Mean vector in amount:These mean vectors are substituted into the GMM information that step (2) trains respectively Safety image color model obtains each small image block each Gaussian component ω in GMM modeliGi(i ∈ 1,2 ..., K }) on Value the color characteristic of U small image blocks is joined together to be denoted as the color characteristic of the small image block
Information security image training sample image is converted into gray level image, Gamma corrections are carried out to input picture;
Calculate the horizontally and vertically Grad g of each pixel (x, y) in gray level imagex(x, y) and gy(x,y);
gx(x, y)=I (x+1, y)-I (x-1, y)
gy(x, y)=I (x, y+1)-I (x, y-1)
In formula, I (x, y) indicates the gray value at pixel (x, y), calculates the gradient magnitude g at pixel (x, y) according to the following formula (x, y) and direction α (x, y);
The gray level image of information security image training sample is divided into information security image, is counted on each information security image Histogram of gradients, the shape information for describing target;
To each information security image using the histogram of 9 bin come the gradient information of pixel in statistical information safety image, The gradient magnitude of pixel in each bin is subjected to the cumulative histogram of gradients for forming the information security image, with 9 dimensional features to It measures to indicate, is denoted as h1=[f1,f2,…,f9], wherein fiFor the gradient accumulated value of i-th of bin;
The gradient eigenvector h combined1With obtain color feature vector h2, form the feature vector of information security image [h1,h2];
The combination of information security image is blocking, and normalized in block;
Input module is connect with main control module, for inputting user's operation pictorial information;
Main control module is connect with image capture module, input module, encrypting module, memory module, judgment module, watermark module, For controlling modules normal work;
The information security image stitching line of the main control module is specifically included using the method blocked across overlapping region is eliminated:
1) use the method for Threshold segmentation that information security image is divided into two parts, high magnitude area and low amounts value area, threshold cost Rule definition such as formula (2) (3):
Wherein be cost (the error hiding metric matrix that formula (1) acquires, δ T] be image segmentation threshold, wherein T1 be overlay region The maximum error hiding magnitude in domain is Fixed constant, δ ∈ (0;ForBinaryzation matrix;
2) judge the beginning and end of suture whether in low amounts value area (Tcost_b=0) and positioned at same connected component, i.e., Judge to whether there is a paths between starting and terminal point;If being not present, indicate figure in there are one or more across overlapping region screening Gear;Blocking across overlapping region is searched, and gradually reduces the magnitude of this occlusion area, until there is no the screenings across overlapping region Gear, makes beginning and end be located in same connected component;Connected region where starting and terminal point at this time, that is, the suture solved is most Small connected domain;
Encrypting module is connect with main control module, for picture to be encrypted;
Image-forming module is connect with encrypting module, for generating encryption picture after image ciphering;
Memory module is connect with main control module, for being stored to encryption picture;
Judgment module is connect with main control module, for picture operation information input by user and encrypting module encryption information into Row matching judgment is opened picture by decoder module if consistent, otherwise can not be opened;
Decoder module is connect with judgment module, is used for according to judgment module judging result, if unanimously, decrypting picture;
Watermark module is connect with main control module, for carrying out embedding watermarking to picture.
2. the image processing system based on information security as described in claim 1, which is characterized in that the watermark module insertion side Method is as follows:
First, not overlap partition is carried out by 2 × 2 pixel sizes to pending image, obtains several sub-blocks, calculate institute in sub-block The gray average is defined as watermark information by the gray average for having pixel;According to first key, is mapped and produced using logistic The first raw pseudorandom binary sequence is encrypted the watermark information to obtain watermark information to be embedded;
Secondly, according to the second key, the second pseudorandom binary sequence generated using logistic mappings is to the watermark information The bit plane of insertion on the pending image, which is encrypted to obtain, encrypts embedded bit plane;
Then, the watermark information to be embedded is embedded into the pending image according to the embedded bit plane of the encryption and is obtained Embedded watermark;
Then, it according to third key, carries out chaos iteration operation and generates chaos real value sequence, the chaos real value sequence is divided For the identical not overlapping partition of multiple sizes, the chaos real value sequence of each subregion is ranked up to obtain ordered sequence, according to Position Number of each of chaos real value sequence of each subregion value in the ordered sequence obtains the embedded address of displacement;Root The embedded watermark is obtained into displacement watermark into line replacement according to the embedded address of displacement;
Finally, as unit of subregion, a subregion containing displacement watermark is exchanged with another subregion;By setting for exchange Watermark is changed to be embedded into pending image.
CN201810323138.3A 2018-04-11 2018-04-11 Image processing system based on information security Active CN108596820B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810323138.3A CN108596820B (en) 2018-04-11 2018-04-11 Image processing system based on information security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810323138.3A CN108596820B (en) 2018-04-11 2018-04-11 Image processing system based on information security

Publications (2)

Publication Number Publication Date
CN108596820A true CN108596820A (en) 2018-09-28
CN108596820B CN108596820B (en) 2022-04-05

Family

ID=63621991

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810323138.3A Active CN108596820B (en) 2018-04-11 2018-04-11 Image processing system based on information security

Country Status (1)

Country Link
CN (1) CN108596820B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109767375A (en) * 2018-12-06 2019-05-17 北京北信源信息安全技术有限公司 The method and system of image watermark insertion and retrospect
CN110232651A (en) * 2019-06-12 2019-09-13 山东科技大学 A kind of reversible information hidden method based on block prediction and difference histogram shifting
CN110286813A (en) * 2019-05-22 2019-09-27 北京达佳互联信息技术有限公司 Picture mark position determines method and apparatus
CN111784708A (en) * 2020-07-03 2020-10-16 上海骏聿数码科技有限公司 Image tamper-proof inspection method and device
CN112529586A (en) * 2020-12-15 2021-03-19 深圳市快付通金融网络科技服务有限公司 Transaction information management method, device, equipment and storage medium
CN112804502A (en) * 2021-03-10 2021-05-14 重庆第二师范学院 Video monitoring system, method, storage medium and device based on artificial intelligence
CN115080931A (en) * 2022-07-21 2022-09-20 南通东德纺织科技有限公司 Textile image copyright protection method based on digital watermark
CN115861034A (en) * 2023-02-20 2023-03-28 深圳市欣博跃电子有限公司 Wireless routing data intelligent management system
CN117768748A (en) * 2024-01-03 2024-03-26 北京睿航至臻科技有限公司 Watermark processing method based on database

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103247017A (en) * 2013-05-08 2013-08-14 江苏大学 Mesh segmentation-based non-blind watermark realization method for three-dimensional mesh model
KR20150002040A (en) * 2013-06-28 2015-01-07 (주) 세인 The way of Real-time Pedestrian Recognition and Tracking using Kalman Filter and Clustering Algorithm based on Cascade Method by HOG
CN104537600A (en) * 2014-12-16 2015-04-22 陕西科技大学 Secondary image encrypting and decrypting methods and watermark information tamper area positioning method
US20160335503A1 (en) * 2013-11-07 2016-11-17 Nuctech Company Limited Inspection methods and devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103247017A (en) * 2013-05-08 2013-08-14 江苏大学 Mesh segmentation-based non-blind watermark realization method for three-dimensional mesh model
KR20150002040A (en) * 2013-06-28 2015-01-07 (주) 세인 The way of Real-time Pedestrian Recognition and Tracking using Kalman Filter and Clustering Algorithm based on Cascade Method by HOG
US20160335503A1 (en) * 2013-11-07 2016-11-17 Nuctech Company Limited Inspection methods and devices
CN104537600A (en) * 2014-12-16 2015-04-22 陕西科技大学 Secondary image encrypting and decrypting methods and watermark information tamper area positioning method

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109767375A (en) * 2018-12-06 2019-05-17 北京北信源信息安全技术有限公司 The method and system of image watermark insertion and retrospect
CN109767375B (en) * 2018-12-06 2022-12-13 北京北信源信息安全技术有限公司 Image watermark embedding and tracing method and system
CN110286813A (en) * 2019-05-22 2019-09-27 北京达佳互联信息技术有限公司 Picture mark position determines method and apparatus
US11574415B2 (en) 2019-05-22 2023-02-07 Beijing Dajia Internet Information Technology Co., Ltd. Method and apparatus for determining an icon position
CN110232651A (en) * 2019-06-12 2019-09-13 山东科技大学 A kind of reversible information hidden method based on block prediction and difference histogram shifting
CN111784708A (en) * 2020-07-03 2020-10-16 上海骏聿数码科技有限公司 Image tamper-proof inspection method and device
CN112529586B (en) * 2020-12-15 2023-07-28 深圳市快付通金融网络科技服务有限公司 Transaction information management method, device, equipment and storage medium
CN112529586A (en) * 2020-12-15 2021-03-19 深圳市快付通金融网络科技服务有限公司 Transaction information management method, device, equipment and storage medium
CN112804502A (en) * 2021-03-10 2021-05-14 重庆第二师范学院 Video monitoring system, method, storage medium and device based on artificial intelligence
CN115080931A (en) * 2022-07-21 2022-09-20 南通东德纺织科技有限公司 Textile image copyright protection method based on digital watermark
CN115861034A (en) * 2023-02-20 2023-03-28 深圳市欣博跃电子有限公司 Wireless routing data intelligent management system
CN117768748A (en) * 2024-01-03 2024-03-26 北京睿航至臻科技有限公司 Watermark processing method based on database
CN117768748B (en) * 2024-01-03 2024-06-11 北京睿航至臻科技有限公司 Watermark processing method based on database

Also Published As

Publication number Publication date
CN108596820B (en) 2022-04-05

Similar Documents

Publication Publication Date Title
CN108596820A (en) a kind of image processing system based on information security
Korshunov et al. Using warping for privacy protection in video surveillance
KR100878579B1 (en) Watermarking Method, Watermark Validation Method, Watermarking Device and Watermark Validation Device
Yahya Steganography techniques for digital images
US7313248B2 (en) Steganographic image encoding
US20100067691A1 (en) Document certification and authentication system
JP5435142B2 (en) Image encryption system and image decryption system
Hsu et al. DIGITAL WATERMARKING SCHEME FOR COPYRIGHT PROTECTION AND TAMPERING DETECTION.
Chhajed et al. Applying decision tree for hiding data in binary images for secure and secret information flow
KR101420297B1 (en) Method and Devices for Video Processing Rights Enforcement
KR101809086B1 (en) System for Suppling and Authenticating Digital Contents using Real Time Image Watermarking Technic
Wang et al. Content based authentication of visual cryptography
Lin et al. Applying projection and B-spline to image authentication and remedy
Chowdhuri et al. Improved data hiding capacity through repeated embedding using modified weighted matrix for color image
Lazarov et al. A fragile watermarking algorithm for image tamper detection based on chaotic maps
Manjunatha et al. A survey on image forgery detection techniques
Grusho et al. The research of a method to identify a workplace via a monitor snapshot
Tsai et al. A new repeating color watermarking scheme based on human visual model
Albanesi et al. A taxonomy for image authentication techniques and its application to the current state of the art
Dadkhah et al. Efficient image authentication and tamper localization algorithm using active watermarking
Hameed et al. A High Quality Secure Medical Image Steganography Method
Bolla et al. A two phase copyright protection scheme for digital images using visual cryptography and sampling methods
CN114422651B (en) Image information hiding method, tracing method, hiding device and tracing device
CN109064380A (en) A kind of 3D printing works hide watermark addition verifying system and method
KR102100108B1 (en) Production system for a digital image including hidden-watermarks and system for detecting hidden-watermark

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant