CN110782383B - Electronic certificate personalized information embedding and authentication method for mobile equipment - Google Patents

Electronic certificate personalized information embedding and authentication method for mobile equipment Download PDF

Info

Publication number
CN110782383B
CN110782383B CN201911030214.2A CN201911030214A CN110782383B CN 110782383 B CN110782383 B CN 110782383B CN 201911030214 A CN201911030214 A CN 201911030214A CN 110782383 B CN110782383 B CN 110782383B
Authority
CN
China
Prior art keywords
electronic certificate
watermark
image
certificate image
personalized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911030214.2A
Other languages
Chinese (zh)
Other versions
CN110782383A (en
Inventor
钱彬
黄金
王军华
方万胜
金涛
沈涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Traffic Management Research Institute of Ministry of Public Security
Original Assignee
Traffic Management Research Institute of Ministry of Public Security
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Traffic Management Research Institute of Ministry of Public Security filed Critical Traffic Management Research Institute of Ministry of Public Security
Priority to CN201911030214.2A priority Critical patent/CN110782383B/en
Publication of CN110782383A publication Critical patent/CN110782383A/en
Application granted granted Critical
Publication of CN110782383B publication Critical patent/CN110782383B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0085Time domain based watermarking, e.g. watermarks spread over several images
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention provides an electronic certificate personalized information embedding and authentication method for mobile equipment, which comprises the following steps: step S10, encoding the electronic certificate image and the personalized watermark image; step S20, embedding the watermark and generating the electronic certificate image with the personalized watermark, and sending the electronic certificate image to the mobile equipment of the user; and step S30, acquiring and decoding the electronic certificate image to be detected on the user mobile equipment, regenerating the personalized watermark image, and performing identification and authentication. The invention can effectively embed personalized watermark information without changing the overall visual identification degree of the electronic certificate image, and completes watermark extraction and authentication through mobile equipment.

Description

Electronic certificate personalized information embedding and authentication method for mobile equipment
Technical Field
The invention relates to the technical field of image processing and digital security, in particular to an electronic certificate personalized information embedding and authentication method for mobile equipment.
Background
Today, scientific technology is rapidly developing, mobile devices (mobile phones, tablet computers and the like) are generally applied, the era of mobile internet is coming, and various digital information applications are introduced into daily life of people and bring great convenience to people. It is against this background that electronic certificates that have recently emerged have attracted a great deal of attention. Electronic identity cards are electronic identity cards stored in mobile devices, represented by concepts such as electronic identity cards, electronic driver licenses, electronic social security cards and the like. Electronic certificates are portable, but the value behind them is not just that. The electronic identity card, the electronic driving license or the electronic social security card is provided, which is equal to a bridge for the online and offline lives of everyone, so that the person can not only prove the identity in the internet world, but also become the last kilometer for connecting each public service provided by the government on the internet and the real world. Therefore, electronic certificates are actively used as targets for strategic deployment and intensive research, both in relevant governments and in various business entities.
Although the digital certificate can be greatly convenient, a plurality of potential safety hazards exist, and lawless persons steal and modify digital information by utilizing various channels, so that personalized information cannot be well guaranteed, and legal certifiers cannot accurately identify the real identity of a user. On the other hand, due to the particularity of the mobile device, the networking stability of the mobile device cannot be guaranteed, and therefore a simple and practical electronic certificate authentication method for offline verification of the mobile device is urgently needed.
The existing anti-counterfeiting method based on digital information is mainly based on a digital watermarking technology. Taking digital images as an example, digital watermarking is to embed information with identification into an image carrier through a specific algorithm without affecting the expression and use of original image information. Digital watermarks can be classified into visible watermark embedding and blind watermark embedding according to whether the watermarks are visible or not. The visible watermark directly superimposes the digital watermark on an image space domain according to a certain algorithm, the method is simplest, and a plurality of websites adopt the method for protecting the private rights and interests of the images, but for important digital certificates, the method is most easily cracked and tampered by lawbreakers due to the characteristic that the digital watermark is completely visible to users. The blind watermarking method firstly transforms the image and then embeds the watermark into the transformed domain of the image, which is relatively more robust and secure than the method of directly embedding the watermark. In the watermarking process, a plurality of blind watermarking algorithms need an original image as a reference to extract the watermark, but for electronic certificates on mobile equipment, the original image of the certificate cannot be effectively acquired in an off-line environment.
In order to solve the above problems, a technical means that can verify the authenticity of the electronic certificate photo under an offline environment and can prevent the electronic certificate photo from being maliciously tampered to some extent must be found.
Currently, there is a certain breakthrough and progress in the research on digital blind watermarking, and it has been applied by many commercial-grade products. But these studies and applications are mostly used in scenarios such as desktop PCs. For watermark embedding and anti-counterfeiting of electronic certificates of mobile equipment terminals, no effective solution exists at present.
With the rapid development of smart mobile devices, the graphics image processing capability of the mobile device itself has a qualitative leap compared with the last decade, and a plurality of smart phones with NFC have been put into the market successively. At present, research work and application deployment of digital watermarking on mobile equipment are provided, which lays a good physical foundation for developing anti-counterfeiting research of electronic certificates.
Disclosure of Invention
The invention aims to overcome the defects in the prior art and provides an electronic certificate personalized information embedding and authentication method for mobile equipment. The technical scheme adopted by the invention is as follows:
an electronic document personalization information embedding and authentication method for a mobile device, comprising the steps of:
step S10, encoding the electronic certificate image and the personalized watermark image;
step S20, embedding the watermark and generating the electronic certificate image with the personalized watermark, and sending the electronic certificate image to the mobile equipment of the user;
and step S30, acquiring and decoding the electronic certificate image to be detected on the user mobile equipment, regenerating the personalized watermark image, and performing identification and authentication.
Further, step S10 specifically includes:
step S101, a background management system performs discrete wavelet transformation on an electronic certificate image uploaded by a user, and takes out a high-frequency sub-band part HH1 as a carrier for embedding a watermark;
step S102, performing singular value decomposition on HH1 to obtain a corresponding dictionary matrix SV1 and a corresponding coefficient matrix D1;
step S103, the background management system generates personalized watermark images according to a certain time interval and carries out singular value decomposition to obtain a corresponding dictionary matrix SV2 and a corresponding coefficient matrix D2, wherein D2 is used as a decoding key and is placed in the checking equipment;
in step S104, SV2 is encoded according to a preset encoding rule, and a new dictionary matrix SV3 is generated.
Further, step S20 specifically includes:
step S201, replacing SV1 with SV3, and multiplying the result by D1 to obtain a new high-frequency subband HH 1';
and step S202, generating the electronic certificate image with the personalized watermark by adopting the inverse discrete wavelet transform, and sending the electronic certificate image to the mobile equipment of the user.
Further, in step S103, D2 is valid for a certain time interval, and needs to be re-issued to the pinging device after exceeding the preset time interval.
Further, step S30 is performed by the pinging device, and specifically includes:
step S301, acquiring an electronic certificate image to be detected through the NFC function of the mobile equipment;
step S302, discrete wavelet transform is carried out on the electronic certificate image to be detected, and a high-frequency sub-band part HH2 is extracted;
step S303, performing singular value decomposition on HH2 to obtain a dictionary matrix SV4 and a coefficient matrix D4;
step S304, carrying out reverse decoding on SV4 according to a preset coding rule to obtain SV 5;
and step S305, multiplying the SV5 and the D2 to regenerate the personalized watermark image.
The invention has the advantages that:
1) different from the existing electronic certificate authentication technology, the authentication method based on the blind watermark can perform preliminary authentication on the electronic certificate in an off-line scene, and has certain tamper resistance.
2) The invention can complete watermark extraction and authentication without depending on the original image of the electronic certificate, and has good adaptability to the anti-counterfeiting of the electronic certificate.
3) The transmission of the image to be detected is realized through the NFC function of the mobile device, and the watermark extraction influenced by extra attack on the image to be detected can be avoided to a certain extent.
Drawings
FIG. 1 is a flow chart of the method of the present invention.
FIG. 2 is a schematic view of an electronic document image of the present invention.
Fig. 3 is a schematic diagram of a personalized watermark image according to the present invention.
Fig. 4 is a schematic view of an electronic document image with embedded watermark according to the present invention.
Fig. 5 is a schematic diagram of a regenerated personalized watermark image according to the present invention.
Detailed Description
The invention is further illustrated by the following specific figures and examples.
The invention provides an electronic certificate personalized information embedding and authentication method for mobile equipment, which comprises the following steps:
step S10, encoding the electronic certificate image and the personalized watermark image; in order to effectively embed watermark information for anti-counterfeiting authentication under the condition of not influencing visual perception, an electronic certificate image needs to be converted into a specific frequency domain for watermark embedding; meanwhile, in order to further enhance the protection function of the watermark information, the decomposed watermark information is encoded according to a preset encoding rule; the specific steps are as follows;
step S101, a background management system performs discrete wavelet transformation on an electronic certificate image uploaded by a user, and takes out a high-frequency sub-band part HH1 as a carrier for embedding a watermark;
an example of an electronic document image uploaded by a user is shown in FIG. 2;
step S102, performing singular value decomposition on HH1 to obtain a corresponding dictionary matrix SV1 and a corresponding coefficient matrix D1;
the dictionary matrix SV1 comprises an S matrix and a V matrix; the formula of the singular value decomposition is as follows:
H=S*V*DT (1)
the S and V matrixes are used as dictionary matrixes and contain a large amount of information in the original matrix H, and can be used as an effective representation method of H;
step S103, the background management system generates personalized watermark images according to a certain time interval (generally set to be 1 day) and carries out singular value decomposition to obtain a corresponding dictionary matrix SV2 and a corresponding coefficient matrix D2, wherein an example of the personalized watermark images is shown in FIG. 3; where D2 is placed in the pinging device as the key for decoding; d2 is valid for a certain time interval, and needs to be re-issued to the pinging device after exceeding a preset time interval (generally set to 1 day);
the checking equipment is handheld equipment of authentication personnel in departments such as public security and the like;
step S104, coding the SV2 according to a preset coding rule to generate a new dictionary matrix SV 3; at this time, SV3 is a matrix re-encoded in a specific order, which can enhance the protection of the watermark to some extent;
step S20, embedding the watermark and generating the electronic certificate image with the personalized watermark; the method specifically comprises the following steps:
step S201, replacing SV1 with SV3, and multiplying the result by D1 to obtain a new high-frequency subband HH 1'; at this point HH 1' already contains watermark information;
step S202, generating an electronic certificate image with a personalized watermark by adopting inverse discrete wavelet transform, and issuing the electronic certificate image to mobile equipment of a user;
in this step, the new high-frequency subband HH 1' may be combined with the remaining medium and low-frequency subbands obtained in the discrete wavelet transform in step S101, and then subjected to an inverse discrete wavelet transform;
step S30, obtaining and decoding the electronic certificate image to be detected on the user mobile equipment, regenerating the personalized watermark image, and identifying and authenticating; this step is performed by the pinging device, and specifically includes:
step S301, acquiring an electronic certificate image to be detected through the NFC function of the mobile equipment;
step S302, discrete wavelet transform is carried out on the electronic certificate image to be detected, and a high-frequency sub-band part HH2 is extracted;
step S303, performing singular value decomposition on HH2 to obtain a dictionary matrix SV4 and a coefficient matrix D4;
step S304, carrying out reverse decoding on SV4 according to a preset coding rule to obtain SV 5;
step S305, multiplying SV5 and D2 to regenerate personalized watermark image; as shown in fig. 5;
and if the regenerated personalized watermark image can be identified, the corresponding electronic certificate is valid, otherwise, the electronic certificate is invalid.
The whole individualized watermark decoding process does not depend on the original image of the electronic certificate in the background management system, the photo inspection of the electronic certificate can be realized in the off-line environment of the mobile equipment, the information data of the electronic certificate at the mobile terminal can be more effectively protected, the safety protection level is improved, and an effective technical scheme is provided for the anti-counterfeiting and safety problems of the digital information of the electronic certificate of a new generation.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention has been described in detail with reference to examples, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention, which should be covered by the claims of the present invention.

Claims (2)

1. An electronic document personalization information embedding and authentication method for a mobile device, comprising the steps of:
step S10, encoding the electronic certificate image and the personalized watermark image;
step S20, embedding the watermark and generating the electronic certificate image with the personalized watermark, and sending the electronic certificate image to the mobile equipment of the user;
step S30, obtaining and decoding the electronic certificate image to be detected on the user mobile equipment, regenerating the personalized watermark image, and performing identification and authentication;
step S10 specifically includes:
step S101, a background management system performs discrete wavelet transformation on an electronic certificate image uploaded by a user, and takes out a high-frequency sub-band part HH1 as a carrier for embedding a watermark;
step S102, performing singular value decomposition on HH1 to obtain a corresponding dictionary matrix SV1 and a corresponding coefficient matrix D1;
step S103, the background management system generates personalized watermark images according to a certain time interval and carries out singular value decomposition to obtain a corresponding dictionary matrix SV2 and a corresponding coefficient matrix D2, wherein D2 is used as a decoding key and is placed in the checking equipment;
step S104, coding the SV2 according to a preset coding rule to generate a new dictionary matrix SV 3;
step S20 specifically includes:
step S201, replacing SV1 with SV3, and multiplying the result by D1 to obtain a new high-frequency subband HH 1';
step S202, generating an electronic certificate image with a personalized watermark by adopting inverse discrete wavelet transform, and issuing the electronic certificate image to mobile equipment of a user;
step S30 is performed by the pinging device, and specifically includes:
step S301, acquiring an electronic certificate image to be detected through the NFC function of the mobile equipment;
step S302, discrete wavelet transform is carried out on the electronic certificate image to be detected, and a high-frequency sub-band part HH2 is extracted;
step S303, performing singular value decomposition on HH2 to obtain a dictionary matrix SV4 and a coefficient matrix D4;
step S304, carrying out reverse decoding on SV4 according to a preset coding rule to obtain SV 5;
and step S305, multiplying the SV5 and the D2 to regenerate the personalized watermark image.
2. The electronic document personalization information embedding and authentication method for mobile devices of claim 1,
in step S103, D2 is valid for a certain time interval, and needs to be re-sent to the pinging device after exceeding a preset time interval.
CN201911030214.2A 2019-10-28 2019-10-28 Electronic certificate personalized information embedding and authentication method for mobile equipment Active CN110782383B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911030214.2A CN110782383B (en) 2019-10-28 2019-10-28 Electronic certificate personalized information embedding and authentication method for mobile equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911030214.2A CN110782383B (en) 2019-10-28 2019-10-28 Electronic certificate personalized information embedding and authentication method for mobile equipment

Publications (2)

Publication Number Publication Date
CN110782383A CN110782383A (en) 2020-02-11
CN110782383B true CN110782383B (en) 2022-01-04

Family

ID=69387002

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911030214.2A Active CN110782383B (en) 2019-10-28 2019-10-28 Electronic certificate personalized information embedding and authentication method for mobile equipment

Country Status (1)

Country Link
CN (1) CN110782383B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1725244A (en) * 2005-07-19 2006-01-25 电子科技大学 Generating and vertification method for electronic seal based on vulnerable water mark
WO2011020237A1 (en) * 2009-08-18 2011-02-24 Hewlett-Packard Development Company, L.P. Communicating electronic mail
CN104867098A (en) * 2015-05-26 2015-08-26 济南大学 Electronic certificate false proof and identification method based on digit watermarking

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1725244A (en) * 2005-07-19 2006-01-25 电子科技大学 Generating and vertification method for electronic seal based on vulnerable water mark
WO2011020237A1 (en) * 2009-08-18 2011-02-24 Hewlett-Packard Development Company, L.P. Communicating electronic mail
CN104867098A (en) * 2015-05-26 2015-08-26 济南大学 Electronic certificate false proof and identification method based on digit watermarking

Also Published As

Publication number Publication date
CN110782383A (en) 2020-02-11

Similar Documents

Publication Publication Date Title
Mohanarathinam et al. Digital watermarking techniques for image security: a review
Anand et al. Watermarking techniques for medical data authentication: a survey
Singh Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images
Begum et al. Digital image watermarking techniques: a review
Kumar et al. A recent survey on multimedia and database watermarking
Kaur et al. Digital watermarking of ecg data for secure wireless commuication
Lu et al. Multipurpose watermarking for image authentication and protection
Tao et al. Robust image watermarking theories and techniques: A review
Verma et al. An overview of robust digital image watermarking
Singh et al. Data hiding in encryption–compression domain
Thulasidharan et al. QR code based blind digital image watermarking with attack detection code
CN107103577A (en) Half fragile uniqueness image watermark insertion and extracting method for integrity protection
Lakrissi et al. Novel dynamic color image watermarking based on DWT-SVD and the human visual system
Vasudev A review on digital image watermarking and its techniques
Hadmi et al. A robust and secure perceptual hashing system based on a quantization step analysis
Singh et al. Digital image watermarking: concepts and applications
Dogan et al. A new watermarking system based on discrete cosine transform (DCT) in color biometric images
Gul A blind robust color image watermarking method based on discrete wavelet transform and discrete cosine transform using grayscale watermark image
Narula et al. Comparative analysis of DWT and DWT-SVD watermarking techniques in RGB images
CN110782383B (en) Electronic certificate personalized information embedding and authentication method for mobile equipment
Vaidya et al. Adaptive medical image watermarking system for e-health care applications
Al-Saadi et al. A blind watermarking model of the 3D object and the polygonal mesh objects for securing copyright
Tsai et al. Authentication and recovery for wavelet-based semifragile watermarking
Yasmeen et al. A novel watermarking scheme based on discrete wavelet transform‐singular value decomposition
Al-Taay et al. Multimedia Data Hiding Evaluation Metrics

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant