CN108596820B - Image processing system based on information security - Google Patents

Image processing system based on information security Download PDF

Info

Publication number
CN108596820B
CN108596820B CN201810323138.3A CN201810323138A CN108596820B CN 108596820 B CN108596820 B CN 108596820B CN 201810323138 A CN201810323138 A CN 201810323138A CN 108596820 B CN108596820 B CN 108596820B
Authority
CN
China
Prior art keywords
module
image
information security
information
watermark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810323138.3A
Other languages
Chinese (zh)
Other versions
CN108596820A (en
Inventor
韦鹏程
颜蓓
李莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Education
Original Assignee
Chongqing University of Education
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Education filed Critical Chongqing University of Education
Priority to CN201810323138.3A priority Critical patent/CN108596820B/en
Publication of CN108596820A publication Critical patent/CN108596820A/en
Application granted granted Critical
Publication of CN108596820B publication Critical patent/CN108596820B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking

Abstract

The invention belongs to the technical field of image processing, and discloses an image processing system based on information security, which comprises: the device comprises an image acquisition module, an input module, a main control module, an encryption module, an imaging module, a storage module, a judgment module, a decoding module and a watermark module. The invention provides a method for carrying out non-overlapping blocking by a watermarking module according to the size of 2 multiplied by 2 pixels, extracting a gray mean value from an image to be processed, defining the gray mean value as watermarking information, wherein the gray mean value is represented by 8 binary bits, the upper 6 bits represent an integer part of the gray mean value, embedding the watermarking information extracted from the image to be processed can represent the gray mean value of the image block without error, and the algorithm can detect that the image is falsified no matter whether the image information part or the embedded watermarking information part only has data change of one bit. Meanwhile, the image data and the password are combined through the encryption module, and the safety of image checking can be improved.

Description

Image processing system based on information security
Technical Field
The invention belongs to the technical field of image processing, and particularly relates to an image processing system based on information security.
Background
The information security mainly comprises the following five aspects of ensuring the confidentiality, authenticity, integrity, unauthorized copying and security of a parasitic system. The information security itself includes a wide range, including how to prevent the leakage of the secret of the business enterprise, prevent the browsing of bad information by teenagers, the leakage of personal information, etc. An information security system under a network environment is a key for ensuring information security, and comprises a computer security operating system, various security protocols, security mechanisms (digital signatures, message authentication, data encryption and the like) until security systems, such as UniNAC, DLP and the like, can threaten global security as long as security vulnerabilities exist. Information security means that an information system (including hardware, software, data, people, physical environment and infrastructure thereof) is protected and is not damaged, changed and leaked due to accidental or malicious reasons, the system continuously, reliably and normally operates, information service is not interrupted, and finally service continuity is realized. However, existing images are not easily found if tampered with, resulting in a risk of image dissemination; at the same time, the image is transferred out of the storage device, anyone can view the image, and the privacy of the user is not completely protected.
In summary, the problems of the prior art are as follows: the existing image is not easy to find if tampered, so that the risk of image propagation is caused; at the same time, the image is transferred out of the storage device, anyone can view the image, and the privacy of the user is not completely protected.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides an image processing system based on information security.
The invention is realized in such a way that an image processing system based on information security comprises:
the device comprises an image acquisition module, an input module, a main control module, an encryption module, an imaging module, a storage module, a judgment module, a decoding module and a watermarking module;
the image acquisition module is connected with the main control module and is used for acquiring an original picture;
the image acquisition module extracts HoG characteristics and GMM characteristics of the information security image training sample, and combines the HoG characteristics and the GMM characteristics as the characteristics of the information security image; the method comprises the following steps:
an information security image training sample image is divided into a plurality of information security images, and each pixel in the information security images is converted from RGB color space to YCbCrColor space, and extracting C thereofb、CrA value of the chrominance component; wherein Y represents a luminance component, CbRepresenting the blue chrominance component, CrRepresenting a red chrominance component;
dividing the information security image into U small image blocks which are not overlapped with each other, and respectively calculating the position of each small image block in Cb、CrMean vector on chroma component:
Figure BDA0001624755540000021
respectively substituting the mean vectors into the GMM information security image color model trained in the step (2) to obtain each Gaussian component omega of each small image block in the GMM modeliGi(i ∈ {1,2, …, K }) as the color feature of the small image block, the color features of the U small image blocks are collectively referred to as the color feature of the small image block
Figure BDA0001624755540000022
Converting the information security image training sample image into a gray image, and performing Gamma correction on the input image;
calculating the gradient value g of each pixel point (x, y) in the gray level image in the horizontal direction and the vertical directionx(x, y) and gy(x,y);
gx(x,y)=I(x+1,y)-I(x-1,y)
gy(x,y)=I(x,y+1)-I(x,y-1)
In the formula, I (x, y) represents the gray value at the pixel point (x, y), and the gradient amplitude g (x, y) and the direction alpha (x, y) at the pixel point (x, y) are calculated according to the following formula;
Figure BDA0001624755540000023
Figure BDA0001624755540000024
dividing gray level images of information security image training samples into information security images, and counting gradient histograms on the information security images for describing shape information of targets;
the method comprises the steps of counting gradient information of pixel points in an information security image by adopting a histogram of 9 bins for each information security image, accumulating the gradient size of the pixel points in each bin to form a gradient histogram of the information security image, representing the gradient histogram by using 9-dimensional feature vectors, and recording the gradient histogram as h1=[f1,f2,…,f9]Wherein f isiGradient accumulation value of the ith bin;
jointly derived gradient eigenvectors h1And obtaining a color feature vector h2The feature vector [ h ] of the information security image is formed1,h2];
Combining the information security images into blocks, and normalizing in the blocks;
the input module is connected with the main control module and used for inputting user operation picture information;
the main control module is connected with the image acquisition module, the input module, the encryption module, the storage module, the judgment module and the watermark module and is used for controlling the normal work of each module;
the method for eliminating the cross-overlapping region shielding of the information security image suture line of the main control module specifically comprises the following steps:
1) the information security image is divided into two parts by adopting a threshold segmentation method, namely a high-magnitude region and a low-magnitude region, and the threshold cost criterion is defined as the following formula (2) (3):
Figure BDA0001624755540000031
Figure BDA0001624755540000032
wherein the mismatch metric matrix, δ · T, found for cost (equation (1))]Is an image segmentation threshold, where TI is the maximum mismatching magnitude of the overlap region, which is a fixed constant, δ ∈ (0;
Figure BDA0001624755540000033
is composed of
Figure BDA0001624755540000034
The binarization matrix of (1);
2) judging whether the starting point and the end point of the suture line are both in a low-magnitude region (Tcost _ b is 0) and are positioned in the same connected component, namely judging whether a path exists between the starting point and the end point; if not, the representation has one or more shelters crossing the overlapping area in the diagram; searching for the shielding across the overlapping area, and gradually reducing the magnitude of the shielding area until the shielding across the overlapping area does not exist, so that the starting point and the end point are positioned in the same connected component; at the moment, the communication area where the starting point and the end point are located is the minimum communication area of the solved suture line;
the encryption module is connected with the main control module and used for encrypting the picture;
the imaging module is connected with the encryption module and used for encrypting the picture to generate an encrypted picture;
the storage module is connected with the main control module and used for storing the encrypted pictures;
the judging module is connected with the main control module and is used for matching and judging the picture operation information input by the user and the encryption information of the encryption module, if the picture operation information is consistent with the encryption information of the encryption module, the picture is opened through the decoding module, otherwise, the picture cannot be opened;
the decoding module is connected with the judging module and used for decrypting the picture according to the judgment result of the judging module if the judgment result is consistent with the judgment result of the judging module;
and the watermark module is connected with the main control module and is used for embedding watermarks in the pictures.
Further, the watermark module embedding method is as follows:
firstly, carrying out non-overlapping blocking on an image to be processed according to the size of 2 multiplied by 2 pixels to obtain a plurality of sub-blocks, calculating the gray average value of all pixels in the sub-blocks, and defining the gray average value as watermark information; according to the first secret key, a first pseudorandom binary sequence generated by the logistic mapping is utilized to encrypt the watermark information to obtain watermark information to be embedded;
secondly, according to a second secret key, a second pseudorandom binary sequence generated by logistic mapping is utilized to encrypt the embedded bit plane of the watermark information on the image to be processed to obtain an encrypted embedded bit plane;
then, embedding the watermark information to be embedded into the image to be processed according to the encrypted embedding bit plane to obtain an embedded watermark;
then, according to a third key, performing chaotic iterative operation to generate a chaotic real value sequence, dividing the chaotic real value sequence into a plurality of non-overlapping partitions with the same size, sequencing the chaotic real value sequence of each partition to obtain an ordered sequence, and obtaining a replacement embedded address according to the position number of each value in the chaotic real value sequence of each partition in the ordered sequence; replacing the embedded watermark according to the replacement embedded address to obtain a replacement watermark;
finally, one partition containing the replacement watermark is exchanged with another partition by taking the partition as a unit; and embedding the exchanged replacement watermark into the image to be processed.
The invention has the advantages and positive effects that: the invention provides a method for carrying out non-overlapping blocking by a watermarking module according to the size of 2 multiplied by 2 pixels, extracting a gray mean value from an image to be processed, and defining the gray mean value as watermarking information, wherein the gray mean value is represented by 8 bit binary bits, wherein the upper 6 bits represent the integer part of the gray mean value, and finally 2 bits represent the decimal part of the gray value. Even if only 1bit information is tampered, the method can detect and accurately position the tampered area. The watermark information extracted from the image to be processed is embedded to represent the gray level mean value of the image block without error, and the algorithm can detect that the image is falsified no matter whether the image information part or the embedded watermark information part has data change of one bit. Meanwhile, the image data and the password are combined through the encryption module, and the safety of image checking can be improved.
Drawings
Fig. 1 is a block diagram of an image processing system based on information security according to an embodiment of the present invention.
In the figure: 1. an image acquisition module; 2. an input module; 3. a main control module; 4. an encryption module; 5. an imaging module; 6. a storage module; 7. a judgment module; 8. a decoding module; 9. and a watermarking module.
Detailed Description
In order to further understand the contents, features and effects of the present invention, the following embodiments are illustrated and described in detail with reference to the accompanying drawings.
The structure of the present invention will be described in detail below with reference to the accompanying drawings.
As shown in fig. 1, the image processing system based on information security provided by the present invention includes: the image acquisition system comprises an image acquisition module 1, an input module 2, a main control module 3, an encryption module 4, an imaging module 5, a storage module 6, a judgment module 7, a decoding module 8 and a watermarking module 9.
The image acquisition module 1 is connected with the main control module 3 and is used for acquiring an original picture;
the input module 2 is connected with the main control module 3 and is used for inputting user operation picture information;
the main control module 3 is connected with the image acquisition module 1, the input module 2, the encryption module 4, the storage module 6, the judgment module 7 and the watermark module 9 and is used for controlling the normal work of each module;
the encryption module 4 is connected with the main control module 3 and used for encrypting the pictures;
the imaging module 5 is connected with the encryption module 4 and used for encrypting the picture to generate an encrypted picture;
the storage module 6 is connected with the main control module 3 and used for storing the encrypted pictures;
the judging module 7 is connected with the main control module 3 and is used for matching and judging the picture operation information input by the user and the encrypted information of the encryption module 4, if the picture operation information is consistent with the encrypted information of the encryption module 4, the picture is opened through the decoding module 8, otherwise, the picture cannot be opened;
the decoding module 8 is connected with the judging module 7 and used for decrypting the picture according to the judgment result of the judging module 7 if the judgment result is consistent with the judgment result of the judging module 7;
and the watermarking module 9 is connected with the main control module 3 and is used for embedding watermarks in the pictures.
The image acquisition module extracts HoG characteristics and GMM characteristics of the information security image training sample, and combines the HoG characteristics and the GMM characteristics as the characteristics of the information security image; the method comprises the following steps:
an information security image training sample image is divided into a plurality of information security images, and each pixel in the information security images is converted from RGB color space to YCbCrColor space, and extracting C thereofb、CrA value of the chrominance component; wherein Y represents a luminance component, CbRepresenting the blue chrominance component, CrRepresenting a red chrominance component;
dividing the information security image into U small image blocks which are not overlapped with each other, and respectively calculating the position of each small image block in Cb、CrMean vector on chroma component:
Figure BDA0001624755540000061
respectively dividing the mean vectorsSubstituting the GMM information security image color model trained in the step (2) to obtain each Gaussian component omega of each small image block in the GMM modeliGi(i ∈ {1,2, …, K }) as the color feature of the small image block, the color features of the U small image blocks are collectively referred to as the color feature of the small image block
Figure BDA0001624755540000062
Converting the information security image training sample image into a gray image, and performing Gamma correction on the input image;
calculating the gradient value g of each pixel point (x, y) in the gray level image in the horizontal direction and the vertical directionx(x, y) and gy(x,y);
gx(x,y)=I(x+1,y)-I(x-1,y)
gy(x,y)=I(x,y+1)-I(x,y-1)
In the formula, I (x, y) represents the gray value at the pixel point (x, y), and the gradient amplitude g (x, y) and the direction alpha (x, y) at the pixel point (x, y) are calculated according to the following formula;
Figure BDA0001624755540000063
Figure BDA0001624755540000071
dividing gray level images of information security image training samples into information security images, and counting gradient histograms on the information security images for describing shape information of targets;
the method comprises the steps of counting gradient information of pixel points in an information security image by adopting a histogram of 9 bins for each information security image, accumulating the gradient size of the pixel points in each bin to form a gradient histogram of the information security image, representing the gradient histogram by using 9-dimensional feature vectors, and recording the gradient histogram as h1=[f1,f2,…,f9]Wherein f isiGradient accumulation value of the ith bin;
jointly derived gradient eigenvectors h1And obtaining a color feature vector h2The feature vector [ h ] of the information security image is formed1,h2];
Combining the information security images into blocks, and normalizing in the blocks;
the method for eliminating the cross-overlapping region shielding of the information security image suture line of the main control module specifically comprises the following steps:
1) the information security image is divided into two parts by adopting a threshold segmentation method, namely a high-magnitude region and a low-magnitude region, and the threshold cost criterion is defined as the following formula (2) (3):
Figure BDA0001624755540000072
Figure BDA0001624755540000073
wherein the mismatch metric matrix, δ · T, found for cost (equation (1))]Is an image segmentation threshold, where T]Is the maximum mismatch magnitude for the overlap region, is a fixed constant, δ ∈ (0;
Figure BDA0001624755540000074
is composed of
Figure BDA0001624755540000075
The binarization matrix of (1);
2) judging whether the starting point and the end point of the suture line are both in a low-magnitude region (Tcost _ b is 0) and are positioned in the same connected component, namely judging whether a path exists between the starting point and the end point; if not, the representation has one or more shelters crossing the overlapping area in the diagram; searching for the shielding across the overlapping area, and gradually reducing the magnitude of the shielding area until the shielding across the overlapping area does not exist, so that the starting point and the end point are positioned in the same connected component; and at the moment, the connected region where the starting point and the end point are located is the minimum connected region of the solved suture line.
The watermark module 9 embedding method provided by the invention is as follows:
firstly, carrying out non-overlapping blocking on an image to be processed according to the size of 2 multiplied by 2 pixels to obtain a plurality of sub-blocks, calculating the gray average value of all pixels in the sub-blocks, and defining the gray average value as watermark information; according to the first secret key, a first pseudorandom binary sequence generated by the logistic mapping is utilized to encrypt the watermark information to obtain watermark information to be embedded;
secondly, according to a second secret key, a second pseudorandom binary sequence generated by logistic mapping is utilized to encrypt the embedded bit plane of the watermark information on the image to be processed to obtain an encrypted embedded bit plane;
then, embedding the watermark information to be embedded into the image to be processed according to the encrypted embedding bit plane to obtain an embedded watermark;
then, according to a third key, performing chaotic iterative operation to generate a chaotic real value sequence, dividing the chaotic real value sequence into a plurality of non-overlapping partitions with the same size, sequencing the chaotic real value sequence of each partition to obtain an ordered sequence, and obtaining a replacement embedded address according to the position number of each value in the chaotic real value sequence of each partition in the ordered sequence; replacing the embedded watermark according to the replacement embedded address to obtain a replacement watermark;
finally, one partition containing the replacement watermark is exchanged with another partition by taking the partition as a unit; and embedding the exchanged replacement watermark into the image to be processed.
When the method is used for processing, an original picture is acquired through the image acquisition module 1; the main control module 3 calls the encryption module 4 to encrypt the picture; then, the image is encrypted through the imaging module 5 to generate an encrypted image; storing the encrypted picture through a storage module 6; the user inputs user operation picture information through the input module 2; the main control module 3 calls the judging module 7 to carry out matching judgment on the picture operation information input by the user and the encryption information of the encryption module 4, if the picture operation information is consistent with the encryption information of the encryption module 4, the picture is opened through the decoding module 8, otherwise, the picture cannot be opened; the picture is watermarked by the watermarking module 9.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the present invention in any way, and all simple modifications, equivalent changes and modifications made to the above embodiment according to the technical spirit of the present invention are within the scope of the technical solution of the present invention.

Claims (2)

1. An information security-based image processing system, characterized in that the information security-based image processing system comprises:
the device comprises an image acquisition module, an input module, a main control module, an encryption module, an imaging module, a storage module, a judgment module, a decoding module and a watermarking module;
the image acquisition module is connected with the main control module and is used for acquiring an original picture;
the image acquisition module extracts HoG characteristics and GMM characteristics of the information security image training sample, and combines the HoG characteristics and the GMM characteristics as the characteristics of the information security image; the method comprises the following steps:
an information security image training sample image is divided into a plurality of information security images, and each pixel in the information security images is converted from RGB color space to YCbCrColor space, and extracting C thereofb、CrA value of the chrominance component; wherein Y represents a luminance component, CbRepresenting the blue chrominance component, CrRepresenting a red chrominance component;
dividing the information security image into U small image blocks which are not overlapped with each other, and respectively calculating the position of each small image block in Cb、CrMean vector on chroma component:
Figure FDA0003292309100000011
respectively substituting the mean vectors into the GMM information security image color model trained in the step (2) to obtain each Gaussian component omega of each small image block in the GMM modeliGiWhere i ∈ {1,2, …, K }, the color features of the U small image blocks are jointly written as the color features of the small image blocks
Figure FDA0003292309100000012
Converting the information security image training sample image into a gray image, and performing Gamma correction on the input image;
calculating the gradient value g of each pixel point (x, y) in the gray level image in the horizontal direction and the vertical directionx(x, y) and gy(x,y);
gx(x,y)=I(x+1,y)-I(x-1,y)
gy(x,y)=I(x,y+1)-I(x,y-1)
In the formula, I (x, y) represents the gray value at the pixel point (x, y), and the gradient amplitude g (x, y) and the direction alpha (x, y) at the pixel point (x, y) are calculated according to the following formula;
Figure FDA0003292309100000021
Figure FDA0003292309100000022
dividing gray level images of information security image training samples into information security images, and counting gradient histograms on the information security images for describing shape information of targets;
the method comprises the steps of counting gradient information of pixel points in an information security image by adopting a histogram of 9 bins for each information security image, accumulating the gradient size of the pixel points in each bin to form a gradient histogram of the information security image, representing the gradient histogram by using 9-dimensional feature vectors, and recording the gradient histogram as h1=[f1,f2,…,f9]Wherein f isiGradient accumulation value of the ith bin;
jointly derived gradient eigenvectors h1And obtaining a color feature vector h2The feature vector [ h ] of the information security image is formed1,h2];
Combining the information security images into blocks, and normalizing in the blocks;
the input module is connected with the main control module and used for inputting user operation picture information;
the main control module is connected with the image acquisition module, the input module, the encryption module, the storage module, the judgment module and the watermark module and is used for controlling the normal work of each module;
the method for eliminating the cross-overlapping region shielding of the information security image suture line of the main control module specifically comprises the following steps:
1) the information security image is divided into two parts by adopting a threshold segmentation method, namely a high-magnitude region and a low-magnitude region, and the threshold cost criterion is defined as the following formula (2) (3):
Figure FDA0003292309100000023
Figure FDA0003292309100000024
wherein Tcost is the derived mismatch metric matrix, δ THmaxIs an image segmentation threshold, where HmaxThe maximum mismatching magnitude value of the overlapping area is delta which is a fixed constant and belongs to 0; tcost _ b is a binary matrix;
2) judging whether the starting point and the end point of the suture line are both 0 in the low-magnitude value region Tcost _ b and are positioned in the same connected component, namely judging whether a path exists between the starting point and the end point; if not, the representation has one or more shelters crossing the overlapping area in the diagram; searching for the shielding across the overlapping area, and gradually reducing the magnitude of the shielding area until the shielding across the overlapping area does not exist, so that the starting point and the end point are positioned in the same connected component; at the moment, the communication area where the starting point and the end point are located is the minimum communication area of the solved suture line;
the encryption module is connected with the main control module and used for encrypting the picture;
the imaging module is connected with the encryption module and used for encrypting the picture to generate an encrypted picture;
the storage module is connected with the main control module and used for storing the encrypted pictures;
the judging module is connected with the main control module and is used for matching and judging the picture operation information input by the user and the encryption information of the encryption module, if the picture operation information is consistent with the encryption information of the encryption module, the picture is opened through the decoding module, otherwise, the picture cannot be opened;
the decoding module is connected with the judging module and used for decrypting the picture according to the judgment result of the judging module if the judgment result is consistent with the judgment result of the judging module;
and the watermark module is connected with the main control module and is used for embedding watermarks in the pictures.
2. The information security-based image processing system according to claim 1, wherein the watermark module embedding method is as follows:
firstly, carrying out non-overlapping blocking on an image to be processed according to the size of 2 multiplied by 2 pixels to obtain a plurality of sub-blocks, calculating the gray average value of all pixels in the sub-blocks, and defining the gray average value as watermark information; according to the first secret key, a first pseudorandom binary sequence generated by the logistic mapping is utilized to encrypt the watermark information to obtain watermark information to be embedded;
secondly, according to a second secret key, a second pseudorandom binary sequence generated by logistic mapping is utilized to encrypt the embedded bit plane of the watermark information on the image to be processed to obtain an encrypted embedded bit plane;
then, embedding the watermark information to be embedded into the image to be processed according to the encrypted embedding bit plane to obtain an embedded watermark;
then, according to a third key, performing chaotic iterative operation to generate a chaotic real value sequence, dividing the chaotic real value sequence into a plurality of non-overlapping partitions with the same size, sequencing the chaotic real value sequence of each partition to obtain an ordered sequence, and obtaining a replacement embedded address according to the position number of each value in the chaotic real value sequence of each partition in the ordered sequence; replacing the embedded watermark according to the replacement embedded address to obtain a replacement watermark;
finally, one partition containing the replacement watermark is exchanged with another partition by taking the partition as a unit; and embedding the exchanged replacement watermark into the image to be processed.
CN201810323138.3A 2018-04-11 2018-04-11 Image processing system based on information security Active CN108596820B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810323138.3A CN108596820B (en) 2018-04-11 2018-04-11 Image processing system based on information security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810323138.3A CN108596820B (en) 2018-04-11 2018-04-11 Image processing system based on information security

Publications (2)

Publication Number Publication Date
CN108596820A CN108596820A (en) 2018-09-28
CN108596820B true CN108596820B (en) 2022-04-05

Family

ID=63621991

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810323138.3A Active CN108596820B (en) 2018-04-11 2018-04-11 Image processing system based on information security

Country Status (1)

Country Link
CN (1) CN108596820B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109767375B (en) * 2018-12-06 2022-12-13 北京北信源信息安全技术有限公司 Image watermark embedding and tracing method and system
CN110286813B (en) * 2019-05-22 2020-12-01 北京达佳互联信息技术有限公司 Icon position determining method and device
CN110232651B (en) * 2019-06-12 2021-06-01 山东科技大学 Reversible information hiding method based on block prediction and differential value histogram translation
CN111784708B (en) * 2020-07-03 2021-03-12 上海骏聿数码科技有限公司 Image tamper-proof inspection method and device
CN112529586B (en) * 2020-12-15 2023-07-28 深圳市快付通金融网络科技服务有限公司 Transaction information management method, device, equipment and storage medium
CN112804502B (en) * 2021-03-10 2022-07-12 重庆第二师范学院 Video monitoring system, method, storage medium and device based on artificial intelligence
CN115080931B (en) * 2022-07-21 2022-12-27 南通东德纺织科技有限公司 Textile image copyright protection method based on digital watermark
CN115861034B (en) * 2023-02-20 2023-06-20 深圳市欣博跃电子有限公司 Wireless routing data intelligent management system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103247017A (en) * 2013-05-08 2013-08-14 江苏大学 Mesh segmentation-based non-blind watermark realization method for three-dimensional mesh model
KR20150002040A (en) * 2013-06-28 2015-01-07 (주) 세인 The way of Real-time Pedestrian Recognition and Tracking using Kalman Filter and Clustering Algorithm based on Cascade Method by HOG
CN104537600A (en) * 2014-12-16 2015-04-22 陕西科技大学 Secondary image encrypting and decrypting methods and watermark information tamper area positioning method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104636707B (en) * 2013-11-07 2018-03-23 同方威视技术股份有限公司 The method of automatic detection cigarette

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103247017A (en) * 2013-05-08 2013-08-14 江苏大学 Mesh segmentation-based non-blind watermark realization method for three-dimensional mesh model
KR20150002040A (en) * 2013-06-28 2015-01-07 (주) 세인 The way of Real-time Pedestrian Recognition and Tracking using Kalman Filter and Clustering Algorithm based on Cascade Method by HOG
CN104537600A (en) * 2014-12-16 2015-04-22 陕西科技大学 Secondary image encrypting and decrypting methods and watermark information tamper area positioning method

Also Published As

Publication number Publication date
CN108596820A (en) 2018-09-28

Similar Documents

Publication Publication Date Title
CN108596820B (en) Image processing system based on information security
Evsutin et al. Digital steganography and watermarking for digital images: A review of current research directions
JP6342577B2 (en) System and method for detecting attempts to send confidential information over a data delivery channel
US20180253567A1 (en) Tamper Protection and Video Source Identification for Video Processing Pipeline
Lee et al. A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding
US7454797B2 (en) Secure image authentication with discrete level tamper localization
EP3537319A1 (en) Tamper protection and video source identification for video processing pipeline
Li et al. Multi-block dependency based fragile watermarking scheme for fingerprint images protection
CN107346528B (en) Image tampering detection method based on double-image reversible fragile watermark
Chhajed et al. Applying decision tree for hiding data in binary images for secure and secret information flow
CN113987581A (en) Method for data security protection and traceability check of intelligent security community platform
KR20090004552A (en) Method and devices for video processing rights enforcement
Chhajed et al. Data hiding in binary images for secret and secure communication using decision tree
Thanekar et al. OCTA (STAR) PVD: A different approach of image steganopgraphy
RU2761417C1 (en) Method for steganographying a digital image using a graphic digital label and method for decrypting a steganographied image
Ruban et al. Methodology for assessing the effectiveness of methods for embedding digital watermarks
Steinebach et al. Privacy and Robust Hashes Privacy-Preserving Forensics for Image Re-Identification.
Sultana et al. Privacy preserving LBP based feature extraction on encrypted images
Dadkhah et al. Efficient image authentication and tamper localization algorithm using active watermarking
Lafta et al. Secure Content-Based Image Retrieval with Copyright Protection within Cloud Computing Environment.
CN114422651B (en) Image information hiding method, tracing method, hiding device and tracing device
Hameed et al. A High Quality Secure Medical Image Steganography Method
Powell Securing LSB embedding against structural steganalysis
Ren et al. Multi-Carrier Information Hiding Algorithm Based on Angle Structure Descriptor
Jothimani et al. Image authentication using global and local features

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant