CN110580405B - Picture copyright protection system and method based on social network - Google Patents

Picture copyright protection system and method based on social network Download PDF

Info

Publication number
CN110580405B
CN110580405B CN201910758237.9A CN201910758237A CN110580405B CN 110580405 B CN110580405 B CN 110580405B CN 201910758237 A CN201910758237 A CN 201910758237A CN 110580405 B CN110580405 B CN 110580405B
Authority
CN
China
Prior art keywords
picture
user
authentication
module
authentication code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910758237.9A
Other languages
Chinese (zh)
Other versions
CN110580405A (en
Inventor
张明武
张劭辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei University of Technology
Original Assignee
Hubei University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei University of Technology filed Critical Hubei University of Technology
Priority to CN201910758237.9A priority Critical patent/CN110580405B/en
Publication of CN110580405A publication Critical patent/CN110580405A/en
Application granted granted Critical
Publication of CN110580405B publication Critical patent/CN110580405B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses a picture copyright protection system and method based on a social network, wherein the system comprises a system initialization module: the method comprises the steps of determining public parameters required by a system and confirming a main protection area of a user picture; the picture authentication information generation module: preprocessing a user picture to generate a unique authentication code for protecting the copyright of the user; the picture copyright protection hybrid module: mixing the picture authentication code generated by the picture authentication information generation module, a user identity seal (biological ID) and a picture to generate a picture capable of performing copyright protection authentication; the picture copyright authentication module: the system is used for copyright authentication at any place, extracting the unique authentication code of the picture and the digital watermark of the picture as authentication information of the picture and confirming that the picture is not modified; the method embeds the copyright protection information into the picture in an implicit self-adaptive manner, the generated picture has good quality, the integrity of the picture can be verified in any occasion, and the biological ID information of the user can be obtained under the tampered condition.

Description

Picture copyright protection system and method based on social network
Technical Field
The invention belongs to the technical field of information security, relates to a copyright protection system and a copyright protection method, and particularly relates to a picture copyright protection system and a picture copyright protection method based on a social network.
Background
With the vigorous development of internet technology, people are gradually used to share pictures shot by people on social networks. However, due to the characteristics of internet platform freedom, resource sharing and the like, the pictures uploaded to the network are easily abused if not protected, and are privately used for business without the authorization of a photographer. It has been found that it is difficult to intellectual property protect pictures on social networks and prevent misuse without reliable evidence, so that pirates who misuse other pictures without the owner's permission of the picture are subjected to applicable legal sanctions. The existing picture copyright protection measures based on the social network can print a watermark on a picture to prove copyright, however, the method can seriously affect the picture quality and the viewing comfort and is easily erased by picture processing technology, and therefore, the picture copyright protection system and method based on the social network is very necessary to be provided.
Disclosure of Invention
In order to solve the problem of picture copyright protection in the social network, the invention provides a picture copyright protection system and method based on the social network.
The technical scheme adopted by the system of the invention is as follows: a picture copyright protection system based on a social network is characterized in that: the system comprises a system initialization module, a picture authentication information generation module, a picture copyright protection mixing module and a picture copyright authentication module;
the system initialization module is used for determining public parameters required by the system and confirming a protection area of a user picture;
the picture authentication information generation module is used for preprocessing the user picture and generating a unique authentication code for protecting the copyright of the user;
the picture copyright protection mixing module is used for mixing the picture unique copyright authentication code, the user identity seal or the biological ID generated by the picture authentication information generation module with the picture to generate a picture capable of carrying out copyright protection authentication;
the picture copyright authentication module is used for carrying out copyright authentication at any place, extracting the picture unique copyright authentication code and the user identity seal or the biological ID as the authentication information of the picture and confirming that the picture is not modified.
The method adopts the technical scheme that: a picture copyright protection method based on a social network is characterized by comprising the following steps:
step 1: determining public parameters required by a system and confirming a protection area of a user picture;
step 2: preprocessing a user picture to generate a unique authentication code for protecting the copyright of the user;
and step 3: mixing the picture unique copyright authentication code, the user identity seal or the biological ID generated by the picture authentication information generation module with the picture to generate a picture capable of carrying out copyright protection authentication;
and 4, step 4: and performing copyright authentication at any time and place, extracting the unique copyright authentication code of the picture and the user identity seal or the biological ID as authentication information of the picture, and confirming that the picture is not privately tampered by others.
Preferably, the specific implementation of step 1 comprises the following sub-steps:
step 1.1: the system initialization module determines and discloses a one-way hash function H (x) on the network, and receives the one-way hash calculation request of anyone;
step 1.2: the system initialization module determines a protection area designated by a user and transmits to the picture authentication information generation module.
Preferably, the specific implementation of step 2 comprises the following sub-steps:
step 2.1: the picture authentication information generation module is used for converting the picture into 4 decomposition pictures P1, P2, P3 and P4 according to the picture uploaded by the user and only taking one value in each 2-by-2 small pixel matrix according to rules, randomly selecting or appointing an initial picture P by the user, wherein the P is any one of P1, P2, P3 and P4, splicing the pixel values of the initial pictures P together as input according to a public one-way hash function H (x), and taking the output result as a picture unique copyright authentication code D;
step 2.2: the picture authentication information generation module expands each pixel into a 2 x 2 pixel matrix by using a formula (1) according to the initial picture P, and finally expands the picture into a copyright picture C' which is four times of the size of the initial picture, and sets the formula authority as public query, namely, any person can obtain a corresponding extended picture by using the formula (1) and obtain the detailed information of the formula (1);
Figure GDA0003636251030000021
wherein the corresponding non-overlapping 2 x 2 square matrix (b) of the initial picture P11,b12,b21,b22),b11,b12Two pixel values of the first row, b21,b22Two pixel values for the second row; p is a radical of1、p2、p3Respectively correspond to b11、b12、b21A value at a location;
I1、I2represents the result obtained by the formula (1), at b11,b12Is inserted between1In b11,b21Is inserted between2At b, in11And b22Is inserted between3(ii) a k represents the different results obtained by the calculation;
step 2.3: and the picture authentication information generation module sends the picture unique copyright authentication code D and the copyright picture C' to the picture copyright protection mixing module together.
Preferably, the specific implementation of step 3 comprises the following sub-steps:
step 3.1: the picture copyright protection mixing module receives the picture unique copyright authentication code D and the copyright picture C from the picture authentication information generation module, and acquires a user biological ID or a user identity seal Y through user uploading;
step 3.2: the picture copyright protection hybrid module determines the number of embedded bits of the picture copyright authentication code D through a formula (2):
Figure GDA0003636251030000031
wherein, TjRepresents each value I produced by equation (1)kThe bit number is embedded through the picture unique copyright authentication code D;
step 3.3: embedding the copyright authentication code into I according to the number of the embedded bits determined in the step 3.2kIn the middle, a new copyright picture C' is generated;
step 3.4: the picture copyright protection hybrid module carries out n discrete wavelet transformation on the corresponding region of the copyright picture C 'according to the region designated by the user and the user biological ID or the user identity seal Y to obtain C'nObtaining result C'nSize of seal Y corresponding to user biological ID or user identityEqual;
step 3.5: the picture copyright protection mixing module decomposes the C 'through singular values'nDecomposing into U '. S '. V ', and decomposing Y into UY*SY*VY(ii) a U ', S', V 'are three matrices obtained by singular value decomposition of C' n, and UY、SY、VYThen the result is obtained by performing singular value decomposition on Y;
step 3.6: the picture copyright protection mixing module obtains C embedded with the user biological ID or the user identity seal Y through formulas (3) and (4) according to the watermark strength beta specified by the usernObtaining an output picture C with the same size as the copyright picture C 'through n times of inverse discrete wavelet transform, and uploading the generated S', beta to a credible third-party organization TA;
S=S'+β*SY (3)
Cn=U’*S*V’ (4)
step 3.7: and the picture copyright protection mixing module outputs the picture C as a picture finally containing copyright protection information to be displayed to the user, and the picture C is stored and used after the user confirms the picture C.
Preferably, the specific implementation of step 4 comprises the following sub-steps:
step 4.1: the picture copyright authentication module receives the picture C obtained in the step 3.7 and S' and beta downloaded from the trusted third party organization TA, and converts the picture C into the picture C through the same n discrete wavelet transformnPerforming singular value decomposition to obtain Cn=U’*S*V’
And obtaining C 'through formula (5)'n
C'n=U'*S'*V' (5)
By the formula (6), S is obtainedY
Figure GDA0003636251030000041
Step 4.2: by SYObtaining a user biological ID or a user identity seal Y through an inverse singular value decomposition process;
step 4.3: c'nCarrying out n times of inverse discrete wavelet transform to obtain a picture C';
step 4.4: calculating the value generated by the formula (1) in the obtained picture C' according to the pixel corresponding position and the formula (1), and calculating the embedded picture unique copyright authentication code D;
step 4.1.2: verifying the value of the original picture corresponding to the obtained picture C' through a public one-way Hash algorithm, comparing the obtained Hash value with the picture copyright authentication code, and if the value is equal, indicating that the picture is not tampered and belongs to SYAnd (4) the corresponding user.
Compared with the prior art, the method of the invention has the following advantages and beneficial effects:
(1) the invention provides a picture copyright protection system and method based on a social network, so that a copyright protection picture of a user does not contain an obvious watermark causing picture blurring, but is embedded into the picture by a digital watermark method, and the picture quality under a high-definition picture is improved
(2) The invention has high security, lawless persons can not carry out copyright verification through own biological ID or user seal, and anyone can carry out verification through algorithm at any place through the public parameters, and as the user biological ID (user seal) has uniqueness, other people can not change the copyright verification information of the picture even though stealing the biological ID of the user.
(3) The invention protects the integrity of the picture, and once the picture is tampered, although the copyright information for proving the attribution of the picture can be extracted, the picture can be proved to be tampered by other people due to the inconsistency generated by the hash function, thereby protecting the integrity of the picture generated by the picture owner.
Drawings
FIG. 1: a system architecture diagram of an embodiment of the invention;
FIG. 2: the system initialization method of the embodiment of the invention is a flow chart;
FIG. 3: the authentication information generation method of the embodiment of the invention is a flow chart;
FIG. 4: the invention discloses a flow chart of an authentication information mixing method;
FIG. 5: the copyright picture identity and integrity verification method and the copyright picture identity and integrity verification method are in flow charts.
Detailed Description
In order to facilitate the understanding and practice of the present invention for those of ordinary skill in the art, the present invention will be described in further detail with reference to the accompanying drawings and examples, it being understood that the examples described herein are for illustrative purposes only and are not intended to limit the present invention.
Referring to fig. 1, the picture copyright protection system based on the social network provided by the invention includes a system initialization module, a picture authentication information generation module, a picture copyright protection mixing module, and a picture copyright authentication module;
the system initialization module is used for determining public parameters required by the system and confirming a protection area of a user picture;
the picture authentication information generation module is used for preprocessing the user picture and generating a unique authentication code for protecting the copyright of the user;
the picture copyright protection mixing module is used for mixing the picture unique copyright authentication code, the user identity seal or the biological ID generated by the picture authentication information generation module with the picture to generate a picture capable of carrying out copyright protection authentication;
and the picture copyright authentication module is used for performing copyright authentication at any place, extracting the unique copyright authentication code of the picture and the user identity seal or the biological ID as authentication information of the picture and confirming that the picture is not modified.
The user identity stamp of this embodiment refers to a picture containing information such as a user name and an identification number, and the biometric ID refers to a picture containing a user fingerprint and facial details, and both are used for the same purpose of enabling the user to be authenticated correctly.
In the embodiment, the picture is embedded into the picture by a digital watermarking method, so that the picture quality under the high-definition picture is improved, the picture protected by the copyright of the user does not contain obvious watermarks which cause the picture to be fuzzy, lawless persons cannot carry out copyright verification through own biological ID or user stamps, anyone can carry out verification through an algorithm in any place by using public parameters, and due to the uniqueness of the biological ID (user stamp) of the user, other people cannot change the copyright verification information of the picture even though the biological ID of the user is stolen. Once the picture is tampered, although the copyright information for proving that the picture belongs to can be extracted, due to the inconsistency generated by the hash function, the picture can be proved to be tampered by others, and the integrity of the picture generated by the picture owner is protected.
The invention provides a picture copyright protection method based on a social network, which comprises the following steps:
step 1: determining public parameters required by a system and confirming a protection area of a user picture;
referring to fig. 2, in the present embodiment, the specific implementation of step 1 includes the following sub-steps:
step 1.1: the system initialization module determines and discloses a one-way hash function H (x) on the network, and the output of the one-way hash function H (x) is 160 bits by taking the SHA1 function as an example, so that the one-way hash calculation request of anyone can be received, and a calculation result of 160 bits is returned;
step 1.2: the system initialization module determines a main protection area designated by a user and sends the main protection area to the picture authentication information generation module;
step 2: preprocessing a user picture to generate a unique authentication code for protecting the copyright of the user;
referring to fig. 3, in the present embodiment, the specific implementation of step 2 includes the following sub-steps:
step 2.1: the picture authentication information generation module is used for generating a small pixel matrix (a) of each 2 x 2 according to pictures uploaded by users11,a12,a21,a22) In which only one value is taken regularly (e.g. only a)11Corresponding to the value of the position), the picture is converted into 4 decomposed pictures P1, P2, P3, P4 (corresponding to a only)11,a12,a21,a22Pixel values of corresponding locations) and randomly select (or be designated by the user) the initial picture P (any one of P1, P2, P3, P4, to takeP1 is taken as an example), and according to a public one-way hash function h (x), pixel values of the initial picture P are spliced together as input, and an output result is the picture unique copyright authentication code D;
in this embodiment, the image authentication information generation module converts the image into a pixel matrix according to the image uploaded by the user, and decomposes the pixel matrix into non-overlapping 2 × 2 square matrices (2 rows and 2 columns of square matrices), each 2 × 2 small pixel matrix (a)11,a12,a21,a22)(a11,a12Two pixel values of the first row, a21,a22Two pixel values for the second row), one value at the same position in each 2 x 2 square matrix is not repeatedly taken (e.g. only a is taken)11Value of corresponding position), convert the picture into 4 decomposed pictures P1,P2,P3,P4(it is assumed here that P1For taking a in each 2 x 2 matrix11And obtaining a new pixel matrix corresponding to the value of the position, and converting the new pixel matrix into a picture. Likewise, P1、P2、P3、P4Corresponding to taking a11,a12,a21,a22The pixel value of the corresponding location.
Step 2.2: the picture authentication information generation module utilizes a formula (1) to generate the following picture authentication information according to the initial picture P:
Figure GDA0003636251030000061
wherein, the picture P1Corresponding non-overlapping 2 x 2 square matrices (b)11,b12,b21,b22),b11,b12Two pixel values of the first row, b21,b22Two pixel values for the second row; p is a radical of1、p2、p3Respectively correspond to b11、b12、b21A value at a location; i is1、I2Represents the result obtained by the formula (1), at b11,b12Is inserted between1In b11,b21Is inserted between2In b11And b22Is inserted between3(ii) a k represents the different results obtained by the calculation;
each pixel is expanded into a 2 x 2 pixel matrix, and finally, the picture is expanded into a copyright picture C' with the size four times that of the original picture, and the formula authority is set as public query, namely, anyone can use the formula (1) to obtain a corresponding expanded picture and obtain the detailed information of the formula (1).
For example, the 2 x 2 pixel matrix at the uppermost left corner of the original picture is
Figure GDA0003636251030000071
Then I1=0.35*150+0.65*164=159,I2=0.35*150+0.65*125=134,I30.5 (159+134) 147, the calculated upper left corner 2 x 2 pixel matrix is
Figure GDA0003636251030000072
Step 2.3: and the picture authentication information generation module sends the picture unique copyright authentication code D and the copyright picture C' to the picture copyright protection mixing module together.
And step 3: mixing the picture unique copyright authentication code, the user identity seal or the biological ID generated by the picture authentication information generation module with the picture to generate a picture capable of carrying out copyright protection authentication;
referring to fig. 4, in the present embodiment, the specific implementation of step 3 includes the following sub-steps:
step 3.1: the picture copyright protection mixing module receives the picture copyright authentication code D and the copyright picture C from the picture authentication information generation module, and acquires a user biological ID or a user identity seal Y through user uploading; it is assumed here that a fingerprint gray-scale image of the user is taken as the user biometric ID.
Step 3.2: the picture copyright protection hybrid module determines the number of embedded bits of the picture unique copyright authentication code D through a formula (2):
Figure GDA0003636251030000073
wherein, TjRepresents each value I produced by equation (1)kAnd the bit number is embedded through the picture unique copyright authentication code D. Taking the original and generated pixel matrix as the example in step 2.2, then
Figure GDA0003636251030000074
Figure GDA0003636251030000075
Step 3.3: embedding the picture unique copyright authentication code into I according to the number of the embedded bits determined in the step 3.2kIn the middle, a new copyright picture C' is generated;
step 3.4: the picture copyright protection hybrid module carries out n discrete wavelet transformation on the corresponding region of the copyright picture C 'according to the region designated by the user and the biological ID (identity seal) of the user to obtain C'nObtaining result C'nEqual to the size of the user biometric ID (identity seal Y). For example, the first 9bit of the copyright authentication code is (010100111)2Then, it is divided into (01) according to T2,(010)2,(0111)2And, then I1Modified to 159+ (01)2160, similarly get I2Modified to 134+ (010)2=136,I3Modified to 147+ (0111)2148. I.e. the modified uppermost left pixel matrix is
Figure GDA0003636251030000081
Step 3.5: the picture copyright protection mixing module decomposes the C 'through singular values'nDecomposing into U '. S '. V ', and decomposing Y into UY*SY*VY(ii) a U ', S', V 'are three matrices obtained by singular value decomposition of C' n, and UY、SY、VYThen the result is obtained by performing singular value decomposition on Y;
step 3.6: the picture copyright protection mixing module passes through a formula (3) according to the watermark strength beta specified by a user:
S=S'+β*SY (3)
and by formula (4)
Cn=U’*S*V’ (4)
Obtaining a C embedded in a user's biometric ID (identity seal)nAnd obtaining an output picture C with the same size as the copyright picture C 'through n times of inverse discrete wavelet transform, and uploading the generated S' and beta to a credible third-party organization TA.
Step 3.7: and the picture copyright protection mixing module outputs the picture C as a picture finally containing copyright protection information to be displayed to the user, and the picture is stored and used after the user confirms the picture.
And 4, step 4: copyright authentication is carried out at any time and place, the unique copyright authentication code of the picture and the user identity seal or the biological ID are extracted as authentication information of the picture, and the picture is confirmed not to be tampered by others privately;
referring to fig. 5, in the present embodiment, the specific implementation of step 4 includes the following sub-steps:
step 4.1: the picture copyright authentication module receives the picture C obtained in the step 3.7 and S' and beta downloaded from the trusted third party organization TA, and converts the picture C into the picture C through the same n discrete wavelet transformnPerforming singular value decomposition to obtain Cn=U’*S*V’
And obtaining C 'through formula (5)'n
C'n=U'*S'*V' (5)
By the formula (6), S is obtainedY
Figure GDA0003636251030000091
Step 4.2: by SYObtaining a user biological ID (identity seal) through an inverse singular value decomposition process;
step 4.3: c'nCarrying out n times of inverse discrete wavelet transform to obtain a picture C';
step 4.4: picture C' to be obtained according to pixelsThe corresponding position and formula (1) calculates therein the value produced by formula (1) and thus calculates the embedded picture unique copyright authentication code D. For example, the 2 x 2 pixel matrix at the top left corner is obtained as
Figure GDA0003636251030000092
And the initial matrix at the top left corner is
Figure GDA0003636251030000093
(P1, position a in Picture C', is used in this example)11,a13,a31,a33dPixel value of) then 2 x 2 pixel matrix can be calculated according to formula (1) and the initial matrix as
Figure GDA0003636251030000094
Then the threshold value can be calculated according to the formula (2) and then the first 9 bits of the copyright authentication code is obtained as 160-2,136-134=(010)2,154-147=(0111)2
Step 4.1.2: the value of the original picture corresponding to picture C' (in this case a in each 2 x 2 matrix) will be obtained11The value of the corresponding position) is verified through a public one-way hash algorithm, the obtained hash value is compared with the picture copyright authentication code, if the obtained hash value is equal to the picture copyright authentication code, the picture is not tampered and belongs to SYAnd (4) the corresponding user.
It should be understood that parts of the specification not set forth in detail are well within the prior art.
It should be understood that the above description of the preferred embodiments is given for clarity and not for any purpose of limitation, and that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (3)

1. A picture copyright protection method based on a social network is characterized by comprising the following steps:
step 1: determining public parameters required by a system and confirming a protection area of a user picture;
the specific implementation of the step 1 comprises the following substeps:
step 1.1: the system initialization module determines and discloses a one-way hash function H (x) on the network, and receives the one-way hash calculation request of anyone;
step 1.2: the system initialization module determines a protection area designated by a user and sends the protection area to the picture authentication information generation module;
step 2: preprocessing a user picture to generate a unique authentication code for protecting the copyright of the user;
the specific implementation of the step 2 comprises the following substeps:
step 2.1: the picture authentication information generation module is used for converting the picture into 4 decomposition pictures P1, P2, P3 and P4 according to the picture uploaded by the user and only taking one value in each 2-by-2 small pixel matrix according to rules, randomly selecting or appointing an initial picture P by the user, wherein the P is any one of P1, P2, P3 and P4, splicing the pixel values of the initial pictures P together as input according to a public one-way hash function H (x), and taking the output result as a picture unique copyright authentication code D;
step 2.2: the picture authentication information generation module expands each pixel into a 2 x 2 pixel matrix by using a formula (1) according to the initial picture P, and finally expands the picture into a copyright picture C' with the size four times that of the initial picture, and sets formula authority to be public query, namely, anyone can obtain a corresponding extended picture by using the formula (1) and obtain detailed information of the formula (1);
Figure FDA0003636251020000011
wherein the corresponding non-overlapping 2 x 2 square matrix (b) of the initial picture P11,b12,b21,b22),b11,b12Two pixel values of the first row, b21,b22Two pixel values for the second row; p is a radical of1、p2、p3Respectively correspond to b11、b12、b21A value at a location; i is1、I2Represents the result obtained by the formula (1), at b11,b12Is inserted between1In b11,b21Is inserted between2In b11And b22Is inserted between3(ii) a k represents the different results obtained by the calculation;
step 2.3: the picture authentication information generation module sends the picture unique copyright authentication code D and the copyright picture C' to the picture copyright protection mixing module together;
and step 3: mixing the picture unique copyright authentication code, the user identity seal or the biological ID generated by the picture authentication information generation module with the picture to generate a picture capable of carrying out copyright protection authentication;
the specific implementation of the step 3 comprises the following substeps:
step 3.1: the picture copyright protection mixing module receives the picture unique copyright authentication code D and the copyright picture C from the picture authentication information generation module, and acquires a user biological ID or a user identity seal Y through user uploading;
step 3.2: the picture copyright protection hybrid module determines the number of embedded bits of the picture copyright authentication code D through a formula (2):
Figure FDA0003636251020000021
wherein, TjRepresents each value I generated by equation (1)kThe bit number is embedded through the picture unique copyright authentication code D;
step 3.3: embedding the copyright authentication code into I according to the number of the embedded bits determined in the step 3.2kIn the middle, a new copyright picture C' is generated;
step 3.4: the picture copyright protection hybrid module carries out n discrete wavelet transformation on the corresponding region of the copyright picture C 'according to the region designated by the user and the user biological ID or the user identity seal Y to obtain C'nObtaining result C'nThe size of the seal is equal to the size of the user biological ID or the user identity seal Y;
step 3.5: the picture copyright protection mixing module decomposes the C 'through singular values'nDecomposing into U '. S '. V ', and decomposing Y into UY*SY*VY(ii) a U ', S', V 'are three matrices obtained by singular value decomposition of C' n, and UY、SY、VYThen the result is obtained by performing singular value decomposition on Y;
step 3.6: the picture copyright protection hybrid module obtains C embedded with a user biological ID or a user identity seal Y through formulas (3) and (4) according to the watermark strength beta specified by the usernObtaining an output picture C with the same size as the copyright picture C 'through n times of inverse discrete wavelet transform, and uploading the generated S', beta to a credible third-party organization TA;
S=S'+β*SY (3)
Cn=U’*S*V’ (4)
step 3.7: the picture copyright protection mixing module outputs a picture C as a picture finally containing copyright protection information to be displayed to a user, and the picture C is stored and used after the user confirms the picture C;
and 4, step 4: and performing copyright authentication at any time and place, extracting the unique copyright authentication code of the picture and the user identity seal or the biological ID as authentication information of the picture, and confirming that the picture is not tampered by others privately.
2. The picture copyright protection method based on the social network as claimed in claim 1, wherein the step 4 is implemented by the following steps:
step 4.1: the picture copyright authentication module receives the picture C obtained in the step 3.7 and S' and beta downloaded from the trusted third-party organization TA, and converts the picture C into C through the same n discrete wavelet transformnPerforming singular value decomposition to obtain Cn=U’*S*V’
And obtaining C 'through formula (5)'n
C'n=U'*S'*V' (5)
By the formula (6), S is obtainedY
Figure FDA0003636251020000031
Step 4.2: by SYObtaining a user biological ID or a user identity seal Y through an inverse singular value decomposition process;
step 4.3: c'nCarrying out n times of inverse discrete wavelet transform to obtain a picture C';
step 4.4: calculating the value generated by the formula (1) in the obtained picture C' according to the corresponding position of the pixel and the formula (1), and calculating an embedded picture unique copyright authentication code D according to the value;
step 4.1.2: verifying the value of the original picture corresponding to the obtained picture C' through a public one-way Hash algorithm, comparing the obtained Hash value with the picture copyright authentication code, and if the value is equal, indicating that the picture is not tampered and belongs to SYAnd (4) the corresponding user.
3. A picture copyright protection system based on a social network, which is used for realizing the picture copyright protection method based on the social network of claim 1 or 2; the method is characterized in that: the system comprises a system initialization module, a picture authentication information generation module, a picture copyright protection mixing module and a picture copyright authentication module;
the system initialization module is used for determining public parameters required by the system and confirming a protection area of a user picture;
the picture authentication information generation module is used for preprocessing the user picture and generating a unique authentication code for protecting the copyright of the user;
the picture copyright protection mixing module is used for mixing the picture unique copyright authentication code, the user identity seal or the biological ID generated by the picture authentication information generation module with the picture to generate a picture capable of carrying out copyright protection authentication;
the picture copyright authentication module is used for carrying out copyright authentication at any place, extracting the picture unique copyright authentication code and the user identity seal or the biological ID as the authentication information of the picture and confirming that the picture is not modified.
CN201910758237.9A 2019-08-16 2019-08-16 Picture copyright protection system and method based on social network Active CN110580405B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910758237.9A CN110580405B (en) 2019-08-16 2019-08-16 Picture copyright protection system and method based on social network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910758237.9A CN110580405B (en) 2019-08-16 2019-08-16 Picture copyright protection system and method based on social network

Publications (2)

Publication Number Publication Date
CN110580405A CN110580405A (en) 2019-12-17
CN110580405B true CN110580405B (en) 2022-07-05

Family

ID=68811639

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910758237.9A Active CN110580405B (en) 2019-08-16 2019-08-16 Picture copyright protection system and method based on social network

Country Status (1)

Country Link
CN (1) CN110580405B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111274550B (en) * 2020-01-19 2022-11-04 牡丹江医学院 Chaos random sequence based protection method for digital copyright of multimedia stream file
CN111881425A (en) * 2020-07-28 2020-11-03 平安科技(深圳)有限公司 Picture copyright authentication method and device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012088663A1 (en) * 2010-12-28 2012-07-05 北京邮电大学 Digital watermark works with characteristics of copyright protection and generation method thereof
CN104463772A (en) * 2014-12-13 2015-03-25 天津远目科技有限公司 Zero watermark method for copyright protection
CN108648130A (en) * 2018-04-04 2018-10-12 宁波大学 A kind of total blindness's digital watermark method with copyright protection and tampering location function
CN109191361A (en) * 2018-09-11 2019-01-11 中国科学院自动化研究所 Image Watermarking, extracting method and correlation technique

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012088663A1 (en) * 2010-12-28 2012-07-05 北京邮电大学 Digital watermark works with characteristics of copyright protection and generation method thereof
CN104463772A (en) * 2014-12-13 2015-03-25 天津远目科技有限公司 Zero watermark method for copyright protection
CN108648130A (en) * 2018-04-04 2018-10-12 宁波大学 A kind of total blindness's digital watermark method with copyright protection and tampering location function
CN109191361A (en) * 2018-09-11 2019-01-11 中国科学院自动化研究所 Image Watermarking, extracting method and correlation technique

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique;Wien Hong;《Information Science》;20130228;全文 *
Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform;Siddharth Singh et.al.;《International Journal of Computer Network and Information Security》;20160430;全文 *
基于同态加密数字水印的图像版权认证系统;许可嘉等;《电脑迷》;20170515(第05期);全文 *

Also Published As

Publication number Publication date
CN110580405A (en) 2019-12-17

Similar Documents

Publication Publication Date Title
Ross et al. Visual cryptography for biometric privacy
Bouslimi et al. A crypto-watermarking system for ensuring reliability control and traceability of medical images
CN101057448A (en) Securely computing a similarity measure
JPH10164549A (en) System for hiding in authentication information is image and image authentication system
CN114170658B (en) Face recognition encryption authentication method and system combining watermarking and deep learning
CN1281608A (en) Cryptographic key generation using biometric data
CN107742272A (en) A kind of semi-fragile watermarks method for positioning and recovering based on distorted image
US6742712B1 (en) Information card and information card system
Yuan et al. Multiscale fragile watermarking based on the Gaussian mixture model
CN110580405B (en) Picture copyright protection system and method based on social network
CN107103577A (en) Half fragile uniqueness image watermark insertion and extracting method for integrity protection
CN116611082A (en) File electronic signature algorithm capable of improving electronic signature security
Komninos et al. Protecting biometric templates with image watermarking techniques
CN116527278A (en) Block chain hidden communication method based on generation type hidden network and image double hidden
Chen et al. VILS: A verifiable image licensing system
EP1116176B1 (en) Information card
Ye et al. Secure medical image sharing for smart healthcare system based on cellular neural network
CN117668787B (en) Electronic document identification encryption and anti-counterfeiting detection method based on convolutional neural network
CN114979402B (en) Shared image storage method based on matrix coding embedding
Hambali et al. Enhance Facial Biometric Template Security using Advance Encryption Standard with Least Significant Bit
CN101782947B (en) Multimedia copyright protection method
CN117077165B (en) Intellectual property information encryption management system
CN106909819A (en) It is a kind of to be suitable to the image information steganography method of intelligent terminal
Umamageswari et al. Enhancing security in medical image communication with JPEG2000 compression and lossless watermarking
Victoria et al. A study on spatial domain and transform domain steganography techniques used in image hiding

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant