CN108596820B - Image processing system based on information security - Google Patents
Image processing system based on information security Download PDFInfo
- Publication number
- CN108596820B CN108596820B CN201810323138.3A CN201810323138A CN108596820B CN 108596820 B CN108596820 B CN 108596820B CN 201810323138 A CN201810323138 A CN 201810323138A CN 108596820 B CN108596820 B CN 108596820B
- Authority
- CN
- China
- Prior art keywords
- module
- image
- information security
- information
- watermark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention belongs to the technical field of image processing, and discloses an image processing system based on information security, which comprises: the device comprises an image acquisition module, an input module, a main control module, an encryption module, an imaging module, a storage module, a judgment module, a decoding module and a watermark module. The invention provides a method for carrying out non-overlapping blocking by a watermarking module according to the size of 2 multiplied by 2 pixels, extracting a gray mean value from an image to be processed, defining the gray mean value as watermarking information, wherein the gray mean value is represented by 8 binary bits, the upper 6 bits represent an integer part of the gray mean value, embedding the watermarking information extracted from the image to be processed can represent the gray mean value of the image block without error, and the algorithm can detect that the image is falsified no matter whether the image information part or the embedded watermarking information part only has data change of one bit. Meanwhile, the image data and the password are combined through the encryption module, and the safety of image checking can be improved.
Description
Technical Field
The invention belongs to the technical field of image processing, and particularly relates to an image processing system based on information security.
Background
The information security mainly comprises the following five aspects of ensuring the confidentiality, authenticity, integrity, unauthorized copying and security of a parasitic system. The information security itself includes a wide range, including how to prevent the leakage of the secret of the business enterprise, prevent the browsing of bad information by teenagers, the leakage of personal information, etc. An information security system under a network environment is a key for ensuring information security, and comprises a computer security operating system, various security protocols, security mechanisms (digital signatures, message authentication, data encryption and the like) until security systems, such as UniNAC, DLP and the like, can threaten global security as long as security vulnerabilities exist. Information security means that an information system (including hardware, software, data, people, physical environment and infrastructure thereof) is protected and is not damaged, changed and leaked due to accidental or malicious reasons, the system continuously, reliably and normally operates, information service is not interrupted, and finally service continuity is realized. However, existing images are not easily found if tampered with, resulting in a risk of image dissemination; at the same time, the image is transferred out of the storage device, anyone can view the image, and the privacy of the user is not completely protected.
In summary, the problems of the prior art are as follows: the existing image is not easy to find if tampered, so that the risk of image propagation is caused; at the same time, the image is transferred out of the storage device, anyone can view the image, and the privacy of the user is not completely protected.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides an image processing system based on information security.
The invention is realized in such a way that an image processing system based on information security comprises:
the device comprises an image acquisition module, an input module, a main control module, an encryption module, an imaging module, a storage module, a judgment module, a decoding module and a watermarking module;
the image acquisition module is connected with the main control module and is used for acquiring an original picture;
the image acquisition module extracts HoG characteristics and GMM characteristics of the information security image training sample, and combines the HoG characteristics and the GMM characteristics as the characteristics of the information security image; the method comprises the following steps:
an information security image training sample image is divided into a plurality of information security images, and each pixel in the information security images is converted from RGB color space to YCbCrColor space, and extracting C thereofb、CrA value of the chrominance component; wherein Y represents a luminance component, CbRepresenting the blue chrominance component, CrRepresenting a red chrominance component;
dividing the information security image into U small image blocks which are not overlapped with each other, and respectively calculating the position of each small image block in Cb、CrMean vector on chroma component:respectively substituting the mean vectors into the GMM information security image color model trained in the step (2) to obtain each Gaussian component omega of each small image block in the GMM modeliGi(i ∈ {1,2, …, K }) as the color feature of the small image block, the color features of the U small image blocks are collectively referred to as the color feature of the small image block
Converting the information security image training sample image into a gray image, and performing Gamma correction on the input image;
calculating the gradient value g of each pixel point (x, y) in the gray level image in the horizontal direction and the vertical directionx(x, y) and gy(x,y);
gx(x,y)=I(x+1,y)-I(x-1,y)
gy(x,y)=I(x,y+1)-I(x,y-1)
In the formula, I (x, y) represents the gray value at the pixel point (x, y), and the gradient amplitude g (x, y) and the direction alpha (x, y) at the pixel point (x, y) are calculated according to the following formula;
dividing gray level images of information security image training samples into information security images, and counting gradient histograms on the information security images for describing shape information of targets;
the method comprises the steps of counting gradient information of pixel points in an information security image by adopting a histogram of 9 bins for each information security image, accumulating the gradient size of the pixel points in each bin to form a gradient histogram of the information security image, representing the gradient histogram by using 9-dimensional feature vectors, and recording the gradient histogram as h1=[f1,f2,…,f9]Wherein f isiGradient accumulation value of the ith bin;
jointly derived gradient eigenvectors h1And obtaining a color feature vector h2The feature vector [ h ] of the information security image is formed1,h2];
Combining the information security images into blocks, and normalizing in the blocks;
the input module is connected with the main control module and used for inputting user operation picture information;
the main control module is connected with the image acquisition module, the input module, the encryption module, the storage module, the judgment module and the watermark module and is used for controlling the normal work of each module;
the method for eliminating the cross-overlapping region shielding of the information security image suture line of the main control module specifically comprises the following steps:
1) the information security image is divided into two parts by adopting a threshold segmentation method, namely a high-magnitude region and a low-magnitude region, and the threshold cost criterion is defined as the following formula (2) (3):
wherein the mismatch metric matrix, δ · T, found for cost (equation (1))]Is an image segmentation threshold, where TI is the maximum mismatching magnitude of the overlap region, which is a fixed constant, δ ∈ (0;is composed ofThe binarization matrix of (1);
2) judging whether the starting point and the end point of the suture line are both in a low-magnitude region (Tcost _ b is 0) and are positioned in the same connected component, namely judging whether a path exists between the starting point and the end point; if not, the representation has one or more shelters crossing the overlapping area in the diagram; searching for the shielding across the overlapping area, and gradually reducing the magnitude of the shielding area until the shielding across the overlapping area does not exist, so that the starting point and the end point are positioned in the same connected component; at the moment, the communication area where the starting point and the end point are located is the minimum communication area of the solved suture line;
the encryption module is connected with the main control module and used for encrypting the picture;
the imaging module is connected with the encryption module and used for encrypting the picture to generate an encrypted picture;
the storage module is connected with the main control module and used for storing the encrypted pictures;
the judging module is connected with the main control module and is used for matching and judging the picture operation information input by the user and the encryption information of the encryption module, if the picture operation information is consistent with the encryption information of the encryption module, the picture is opened through the decoding module, otherwise, the picture cannot be opened;
the decoding module is connected with the judging module and used for decrypting the picture according to the judgment result of the judging module if the judgment result is consistent with the judgment result of the judging module;
and the watermark module is connected with the main control module and is used for embedding watermarks in the pictures.
Further, the watermark module embedding method is as follows:
firstly, carrying out non-overlapping blocking on an image to be processed according to the size of 2 multiplied by 2 pixels to obtain a plurality of sub-blocks, calculating the gray average value of all pixels in the sub-blocks, and defining the gray average value as watermark information; according to the first secret key, a first pseudorandom binary sequence generated by the logistic mapping is utilized to encrypt the watermark information to obtain watermark information to be embedded;
secondly, according to a second secret key, a second pseudorandom binary sequence generated by logistic mapping is utilized to encrypt the embedded bit plane of the watermark information on the image to be processed to obtain an encrypted embedded bit plane;
then, embedding the watermark information to be embedded into the image to be processed according to the encrypted embedding bit plane to obtain an embedded watermark;
then, according to a third key, performing chaotic iterative operation to generate a chaotic real value sequence, dividing the chaotic real value sequence into a plurality of non-overlapping partitions with the same size, sequencing the chaotic real value sequence of each partition to obtain an ordered sequence, and obtaining a replacement embedded address according to the position number of each value in the chaotic real value sequence of each partition in the ordered sequence; replacing the embedded watermark according to the replacement embedded address to obtain a replacement watermark;
finally, one partition containing the replacement watermark is exchanged with another partition by taking the partition as a unit; and embedding the exchanged replacement watermark into the image to be processed.
The invention has the advantages and positive effects that: the invention provides a method for carrying out non-overlapping blocking by a watermarking module according to the size of 2 multiplied by 2 pixels, extracting a gray mean value from an image to be processed, and defining the gray mean value as watermarking information, wherein the gray mean value is represented by 8 bit binary bits, wherein the upper 6 bits represent the integer part of the gray mean value, and finally 2 bits represent the decimal part of the gray value. Even if only 1bit information is tampered, the method can detect and accurately position the tampered area. The watermark information extracted from the image to be processed is embedded to represent the gray level mean value of the image block without error, and the algorithm can detect that the image is falsified no matter whether the image information part or the embedded watermark information part has data change of one bit. Meanwhile, the image data and the password are combined through the encryption module, and the safety of image checking can be improved.
Drawings
Fig. 1 is a block diagram of an image processing system based on information security according to an embodiment of the present invention.
In the figure: 1. an image acquisition module; 2. an input module; 3. a main control module; 4. an encryption module; 5. an imaging module; 6. a storage module; 7. a judgment module; 8. a decoding module; 9. and a watermarking module.
Detailed Description
In order to further understand the contents, features and effects of the present invention, the following embodiments are illustrated and described in detail with reference to the accompanying drawings.
The structure of the present invention will be described in detail below with reference to the accompanying drawings.
As shown in fig. 1, the image processing system based on information security provided by the present invention includes: the image acquisition system comprises an image acquisition module 1, an input module 2, a main control module 3, an encryption module 4, an imaging module 5, a storage module 6, a judgment module 7, a decoding module 8 and a watermarking module 9.
The image acquisition module 1 is connected with the main control module 3 and is used for acquiring an original picture;
the input module 2 is connected with the main control module 3 and is used for inputting user operation picture information;
the main control module 3 is connected with the image acquisition module 1, the input module 2, the encryption module 4, the storage module 6, the judgment module 7 and the watermark module 9 and is used for controlling the normal work of each module;
the encryption module 4 is connected with the main control module 3 and used for encrypting the pictures;
the imaging module 5 is connected with the encryption module 4 and used for encrypting the picture to generate an encrypted picture;
the storage module 6 is connected with the main control module 3 and used for storing the encrypted pictures;
the judging module 7 is connected with the main control module 3 and is used for matching and judging the picture operation information input by the user and the encrypted information of the encryption module 4, if the picture operation information is consistent with the encrypted information of the encryption module 4, the picture is opened through the decoding module 8, otherwise, the picture cannot be opened;
the decoding module 8 is connected with the judging module 7 and used for decrypting the picture according to the judgment result of the judging module 7 if the judgment result is consistent with the judgment result of the judging module 7;
and the watermarking module 9 is connected with the main control module 3 and is used for embedding watermarks in the pictures.
The image acquisition module extracts HoG characteristics and GMM characteristics of the information security image training sample, and combines the HoG characteristics and the GMM characteristics as the characteristics of the information security image; the method comprises the following steps:
an information security image training sample image is divided into a plurality of information security images, and each pixel in the information security images is converted from RGB color space to YCbCrColor space, and extracting C thereofb、CrA value of the chrominance component; wherein Y represents a luminance component, CbRepresenting the blue chrominance component, CrRepresenting a red chrominance component;
dividing the information security image into U small image blocks which are not overlapped with each other, and respectively calculating the position of each small image block in Cb、CrMean vector on chroma component:respectively dividing the mean vectorsSubstituting the GMM information security image color model trained in the step (2) to obtain each Gaussian component omega of each small image block in the GMM modeliGi(i ∈ {1,2, …, K }) as the color feature of the small image block, the color features of the U small image blocks are collectively referred to as the color feature of the small image block
Converting the information security image training sample image into a gray image, and performing Gamma correction on the input image;
calculating the gradient value g of each pixel point (x, y) in the gray level image in the horizontal direction and the vertical directionx(x, y) and gy(x,y);
gx(x,y)=I(x+1,y)-I(x-1,y)
gy(x,y)=I(x,y+1)-I(x,y-1)
In the formula, I (x, y) represents the gray value at the pixel point (x, y), and the gradient amplitude g (x, y) and the direction alpha (x, y) at the pixel point (x, y) are calculated according to the following formula;
dividing gray level images of information security image training samples into information security images, and counting gradient histograms on the information security images for describing shape information of targets;
the method comprises the steps of counting gradient information of pixel points in an information security image by adopting a histogram of 9 bins for each information security image, accumulating the gradient size of the pixel points in each bin to form a gradient histogram of the information security image, representing the gradient histogram by using 9-dimensional feature vectors, and recording the gradient histogram as h1=[f1,f2,…,f9]Wherein f isiGradient accumulation value of the ith bin;
jointly derived gradient eigenvectors h1And obtaining a color feature vector h2The feature vector [ h ] of the information security image is formed1,h2];
Combining the information security images into blocks, and normalizing in the blocks;
the method for eliminating the cross-overlapping region shielding of the information security image suture line of the main control module specifically comprises the following steps:
1) the information security image is divided into two parts by adopting a threshold segmentation method, namely a high-magnitude region and a low-magnitude region, and the threshold cost criterion is defined as the following formula (2) (3):
wherein the mismatch metric matrix, δ · T, found for cost (equation (1))]Is an image segmentation threshold, where T]Is the maximum mismatch magnitude for the overlap region, is a fixed constant, δ ∈ (0;is composed ofThe binarization matrix of (1);
2) judging whether the starting point and the end point of the suture line are both in a low-magnitude region (Tcost _ b is 0) and are positioned in the same connected component, namely judging whether a path exists between the starting point and the end point; if not, the representation has one or more shelters crossing the overlapping area in the diagram; searching for the shielding across the overlapping area, and gradually reducing the magnitude of the shielding area until the shielding across the overlapping area does not exist, so that the starting point and the end point are positioned in the same connected component; and at the moment, the connected region where the starting point and the end point are located is the minimum connected region of the solved suture line.
The watermark module 9 embedding method provided by the invention is as follows:
firstly, carrying out non-overlapping blocking on an image to be processed according to the size of 2 multiplied by 2 pixels to obtain a plurality of sub-blocks, calculating the gray average value of all pixels in the sub-blocks, and defining the gray average value as watermark information; according to the first secret key, a first pseudorandom binary sequence generated by the logistic mapping is utilized to encrypt the watermark information to obtain watermark information to be embedded;
secondly, according to a second secret key, a second pseudorandom binary sequence generated by logistic mapping is utilized to encrypt the embedded bit plane of the watermark information on the image to be processed to obtain an encrypted embedded bit plane;
then, embedding the watermark information to be embedded into the image to be processed according to the encrypted embedding bit plane to obtain an embedded watermark;
then, according to a third key, performing chaotic iterative operation to generate a chaotic real value sequence, dividing the chaotic real value sequence into a plurality of non-overlapping partitions with the same size, sequencing the chaotic real value sequence of each partition to obtain an ordered sequence, and obtaining a replacement embedded address according to the position number of each value in the chaotic real value sequence of each partition in the ordered sequence; replacing the embedded watermark according to the replacement embedded address to obtain a replacement watermark;
finally, one partition containing the replacement watermark is exchanged with another partition by taking the partition as a unit; and embedding the exchanged replacement watermark into the image to be processed.
When the method is used for processing, an original picture is acquired through the image acquisition module 1; the main control module 3 calls the encryption module 4 to encrypt the picture; then, the image is encrypted through the imaging module 5 to generate an encrypted image; storing the encrypted picture through a storage module 6; the user inputs user operation picture information through the input module 2; the main control module 3 calls the judging module 7 to carry out matching judgment on the picture operation information input by the user and the encryption information of the encryption module 4, if the picture operation information is consistent with the encryption information of the encryption module 4, the picture is opened through the decoding module 8, otherwise, the picture cannot be opened; the picture is watermarked by the watermarking module 9.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the present invention in any way, and all simple modifications, equivalent changes and modifications made to the above embodiment according to the technical spirit of the present invention are within the scope of the technical solution of the present invention.
Claims (2)
1. An information security-based image processing system, characterized in that the information security-based image processing system comprises:
the device comprises an image acquisition module, an input module, a main control module, an encryption module, an imaging module, a storage module, a judgment module, a decoding module and a watermarking module;
the image acquisition module is connected with the main control module and is used for acquiring an original picture;
the image acquisition module extracts HoG characteristics and GMM characteristics of the information security image training sample, and combines the HoG characteristics and the GMM characteristics as the characteristics of the information security image; the method comprises the following steps:
an information security image training sample image is divided into a plurality of information security images, and each pixel in the information security images is converted from RGB color space to YCbCrColor space, and extracting C thereofb、CrA value of the chrominance component; wherein Y represents a luminance component, CbRepresenting the blue chrominance component, CrRepresenting a red chrominance component;
dividing the information security image into U small image blocks which are not overlapped with each other, and respectively calculating the position of each small image block in Cb、CrMean vector on chroma component:respectively substituting the mean vectors into the GMM information security image color model trained in the step (2) to obtain each Gaussian component omega of each small image block in the GMM modeliGiWhere i ∈ {1,2, …, K }, the color features of the U small image blocks are jointly written as the color features of the small image blocks
Converting the information security image training sample image into a gray image, and performing Gamma correction on the input image;
calculating the gradient value g of each pixel point (x, y) in the gray level image in the horizontal direction and the vertical directionx(x, y) and gy(x,y);
gx(x,y)=I(x+1,y)-I(x-1,y)
gy(x,y)=I(x,y+1)-I(x,y-1)
In the formula, I (x, y) represents the gray value at the pixel point (x, y), and the gradient amplitude g (x, y) and the direction alpha (x, y) at the pixel point (x, y) are calculated according to the following formula;
dividing gray level images of information security image training samples into information security images, and counting gradient histograms on the information security images for describing shape information of targets;
the method comprises the steps of counting gradient information of pixel points in an information security image by adopting a histogram of 9 bins for each information security image, accumulating the gradient size of the pixel points in each bin to form a gradient histogram of the information security image, representing the gradient histogram by using 9-dimensional feature vectors, and recording the gradient histogram as h1=[f1,f2,…,f9]Wherein f isiGradient accumulation value of the ith bin;
jointly derived gradient eigenvectors h1And obtaining a color feature vector h2The feature vector [ h ] of the information security image is formed1,h2];
Combining the information security images into blocks, and normalizing in the blocks;
the input module is connected with the main control module and used for inputting user operation picture information;
the main control module is connected with the image acquisition module, the input module, the encryption module, the storage module, the judgment module and the watermark module and is used for controlling the normal work of each module;
the method for eliminating the cross-overlapping region shielding of the information security image suture line of the main control module specifically comprises the following steps:
1) the information security image is divided into two parts by adopting a threshold segmentation method, namely a high-magnitude region and a low-magnitude region, and the threshold cost criterion is defined as the following formula (2) (3):
wherein Tcost is the derived mismatch metric matrix, δ THmaxIs an image segmentation threshold, where HmaxThe maximum mismatching magnitude value of the overlapping area is delta which is a fixed constant and belongs to 0; tcost _ b is a binary matrix;
2) judging whether the starting point and the end point of the suture line are both 0 in the low-magnitude value region Tcost _ b and are positioned in the same connected component, namely judging whether a path exists between the starting point and the end point; if not, the representation has one or more shelters crossing the overlapping area in the diagram; searching for the shielding across the overlapping area, and gradually reducing the magnitude of the shielding area until the shielding across the overlapping area does not exist, so that the starting point and the end point are positioned in the same connected component; at the moment, the communication area where the starting point and the end point are located is the minimum communication area of the solved suture line;
the encryption module is connected with the main control module and used for encrypting the picture;
the imaging module is connected with the encryption module and used for encrypting the picture to generate an encrypted picture;
the storage module is connected with the main control module and used for storing the encrypted pictures;
the judging module is connected with the main control module and is used for matching and judging the picture operation information input by the user and the encryption information of the encryption module, if the picture operation information is consistent with the encryption information of the encryption module, the picture is opened through the decoding module, otherwise, the picture cannot be opened;
the decoding module is connected with the judging module and used for decrypting the picture according to the judgment result of the judging module if the judgment result is consistent with the judgment result of the judging module;
and the watermark module is connected with the main control module and is used for embedding watermarks in the pictures.
2. The information security-based image processing system according to claim 1, wherein the watermark module embedding method is as follows:
firstly, carrying out non-overlapping blocking on an image to be processed according to the size of 2 multiplied by 2 pixels to obtain a plurality of sub-blocks, calculating the gray average value of all pixels in the sub-blocks, and defining the gray average value as watermark information; according to the first secret key, a first pseudorandom binary sequence generated by the logistic mapping is utilized to encrypt the watermark information to obtain watermark information to be embedded;
secondly, according to a second secret key, a second pseudorandom binary sequence generated by logistic mapping is utilized to encrypt the embedded bit plane of the watermark information on the image to be processed to obtain an encrypted embedded bit plane;
then, embedding the watermark information to be embedded into the image to be processed according to the encrypted embedding bit plane to obtain an embedded watermark;
then, according to a third key, performing chaotic iterative operation to generate a chaotic real value sequence, dividing the chaotic real value sequence into a plurality of non-overlapping partitions with the same size, sequencing the chaotic real value sequence of each partition to obtain an ordered sequence, and obtaining a replacement embedded address according to the position number of each value in the chaotic real value sequence of each partition in the ordered sequence; replacing the embedded watermark according to the replacement embedded address to obtain a replacement watermark;
finally, one partition containing the replacement watermark is exchanged with another partition by taking the partition as a unit; and embedding the exchanged replacement watermark into the image to be processed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810323138.3A CN108596820B (en) | 2018-04-11 | 2018-04-11 | Image processing system based on information security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810323138.3A CN108596820B (en) | 2018-04-11 | 2018-04-11 | Image processing system based on information security |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108596820A CN108596820A (en) | 2018-09-28 |
CN108596820B true CN108596820B (en) | 2022-04-05 |
Family
ID=63621991
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810323138.3A Active CN108596820B (en) | 2018-04-11 | 2018-04-11 | Image processing system based on information security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108596820B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109767375B (en) * | 2018-12-06 | 2022-12-13 | 北京北信源信息安全技术有限公司 | Image watermark embedding and tracing method and system |
CN110286813B (en) * | 2019-05-22 | 2020-12-01 | 北京达佳互联信息技术有限公司 | Icon position determining method and device |
CN110232651B (en) * | 2019-06-12 | 2021-06-01 | 山东科技大学 | Reversible information hiding method based on block prediction and differential value histogram translation |
CN111784708B (en) * | 2020-07-03 | 2021-03-12 | 上海骏聿数码科技有限公司 | Image tamper-proof inspection method and device |
CN112529586B (en) * | 2020-12-15 | 2023-07-28 | 深圳市快付通金融网络科技服务有限公司 | Transaction information management method, device, equipment and storage medium |
CN112804502B (en) * | 2021-03-10 | 2022-07-12 | 重庆第二师范学院 | Video monitoring system, method, storage medium and device based on artificial intelligence |
CN115080931B (en) * | 2022-07-21 | 2022-12-27 | 南通东德纺织科技有限公司 | Textile image copyright protection method based on digital watermark |
CN115861034B (en) * | 2023-02-20 | 2023-06-20 | 深圳市欣博跃电子有限公司 | Wireless routing data intelligent management system |
CN117768748B (en) * | 2024-01-03 | 2024-06-11 | 北京睿航至臻科技有限公司 | Watermark processing method based on database |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103247017A (en) * | 2013-05-08 | 2013-08-14 | 江苏大学 | Mesh segmentation-based non-blind watermark realization method for three-dimensional mesh model |
KR20150002040A (en) * | 2013-06-28 | 2015-01-07 | (주) 세인 | The way of Real-time Pedestrian Recognition and Tracking using Kalman Filter and Clustering Algorithm based on Cascade Method by HOG |
CN104537600A (en) * | 2014-12-16 | 2015-04-22 | 陕西科技大学 | Secondary image encrypting and decrypting methods and watermark information tamper area positioning method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104636707B (en) * | 2013-11-07 | 2018-03-23 | 同方威视技术股份有限公司 | The method of automatic detection cigarette |
-
2018
- 2018-04-11 CN CN201810323138.3A patent/CN108596820B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103247017A (en) * | 2013-05-08 | 2013-08-14 | 江苏大学 | Mesh segmentation-based non-blind watermark realization method for three-dimensional mesh model |
KR20150002040A (en) * | 2013-06-28 | 2015-01-07 | (주) 세인 | The way of Real-time Pedestrian Recognition and Tracking using Kalman Filter and Clustering Algorithm based on Cascade Method by HOG |
CN104537600A (en) * | 2014-12-16 | 2015-04-22 | 陕西科技大学 | Secondary image encrypting and decrypting methods and watermark information tamper area positioning method |
Also Published As
Publication number | Publication date |
---|---|
CN108596820A (en) | 2018-09-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108596820B (en) | Image processing system based on information security | |
Evsutin et al. | Digital steganography and watermarking for digital images: A review of current research directions | |
Pradhan et al. | Digital image steganography using LSB substitution, PVD, and EMD | |
JP6342577B2 (en) | System and method for detecting attempts to send confidential information over a data delivery channel | |
US20180253567A1 (en) | Tamper Protection and Video Source Identification for Video Processing Pipeline | |
Li et al. | Multi-block dependency based fragile watermarking scheme for fingerprint images protection | |
Chhajed et al. | Applying decision tree for hiding data in binary images for secure and secret information flow | |
CN107346528B (en) | Image tampering detection method based on double-image reversible fragile watermark | |
KR20090004552A (en) | Method and devices for video processing rights enforcement | |
Hamadou et al. | Reversible fragile watermarking scheme for relational database based on prediction‐error expansion | |
Hameed et al. | A High Quality Secure Medical Image Steganography Method | |
Chhajed et al. | Data hiding in binary images for secret and secure communication using decision tree | |
RU2761417C1 (en) | Method for steganographying a digital image using a graphic digital label and method for decrypting a steganographied image | |
Lafta et al. | Secure Content-Based Image Retrieval with Copyright Protection within Cloud Computing Environment. | |
Thanekar et al. | OCTA (STAR) PVD: A different approach of image steganopgraphy | |
Steinebach et al. | Privacy and robust hashes: Privacy-preserving forensics for image re-identification | |
Ren et al. | Multi-Carrier Information Hiding Algorithm Based on Angle Structure Descriptor | |
Powell | Securing LSB embedding against structural steganalysis | |
Sultana et al. | Privacy preserving LBP based feature extraction on encrypted images | |
Dadkhah et al. | Efficient image authentication and tamper localization algorithm using active watermarking | |
Araujo | Information hiding and copyrights | |
CN117056877B (en) | Tamper-proof processing method, terminal equipment and storage medium for electronic document after decryption | |
Kaur et al. | Data hiding technique for secure transmission of medical images | |
Nikam et al. | Digital wall for sensitive data protection | |
Piskovskii et al. | Identifying a Workplace from a Monitor Snapshot |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |