CN111127290B - An Image Authentication Method Based on AMBTC - Google Patents

An Image Authentication Method Based on AMBTC Download PDF

Info

Publication number
CN111127290B
CN111127290B CN201911316925.6A CN201911316925A CN111127290B CN 111127290 B CN111127290 B CN 111127290B CN 201911316925 A CN201911316925 A CN 201911316925A CN 111127290 B CN111127290 B CN 111127290B
Authority
CN
China
Prior art keywords
image
watermark
ambtc
verification
authenticated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911316925.6A
Other languages
Chinese (zh)
Other versions
CN111127290A (en
Inventor
蔡碧丽
苏国栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Polytechnic Normal University
Original Assignee
Fujian Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Normal University filed Critical Fujian Normal University
Priority to CN201911316925.6A priority Critical patent/CN111127290B/en
Publication of CN111127290A publication Critical patent/CN111127290A/en
Application granted granted Critical
Publication of CN111127290B publication Critical patent/CN111127290B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0057Compression invariant watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

本发明提供的一种基于AMBTC的图像认证方法,通过获取待认证图像,并提取出相应的第一验证水印;根据所述第一验证水印和预设的规则对所述待认证图像进行图像认证,提高了验证精度高且能抵挡拼贴攻击。

Figure 201911316925

The present invention provides an AMBTC-based image authentication method, by acquiring an image to be authenticated, and extracting a corresponding first verification watermark; image authentication is performed on the to-be-authenticated image according to the first verification watermark and preset rules , which improves the verification accuracy and resists collage attacks.

Figure 201911316925

Description

一种基于AMBTC的图像认证方法An Image Authentication Method Based on AMBTC

技术领域technical field

本发明涉及图像处理技术领域,特别涉及一种基于AMBTC的图像认证方法。The invention relates to the technical field of image processing, in particular to an AMBTC-based image authentication method.

背景技术Background technique

2018年,洪维恩等人在symmetry期刊中提出Detectability Improved TamperDetection Scheme for Absolute Moment Block Truncation(一种有效的AMBTC压缩图像认证方案),共包含两个策略:LSBR和MSBP。在LSBR策略中,首先利用传统AMBTC技术对图像进行压缩得到AMBTC压缩码。这里,假设某一组压缩码为(h,l,B)。其中,h和l分别成为8位元的高量化值和低量化值,B为该图像区块对应的位图。在LSBR方案中,将h的低a位元和l的低b位元腾出并用于携带(a+b)比特的验证水印ac。验证水印ac的计算如下公示所示:In 2018, Hong Weien et al. proposed Detectability Improved TamperDetection Scheme for Absolute Moment Block Truncation (an effective AMBTC compressed image authentication scheme) in the journal Symmetry, which includes two strategies: LSBR and MSBP. In the LSBR strategy, the traditional AMBTC technology is used to compress the image to obtain the AMBTC compression code. Here, it is assumed that a certain set of compressed codes is (h, l, B). Wherein, h and l become the high quantization value and the low quantization value of 8 bits respectively, and B is the bitmap corresponding to the image block. In the LSBR scheme, the lower a bits of h and the lower b bits of l are vacated and used to carry the verification watermark ac of (a+b) bits. The calculation of the verification watermark ac is shown in the following announcement:

ac=fa+b(hM,lM,B),ac=f a+b (h M , l M , B),

其中,fa+b(·)是一个哈希运算并且输出长度为(a+b)比特。hM是指h的另外(8-a)位元,lM指l的另外(8-b)位元。最后,将产生的(a+b)比特验证水印的前a个比特替换h的低a位元,将另外b个比特替换l的低b位元,实现验证水印的嵌入。where f a+b (·) is a hash operation and the output length is (a+b) bits. hM refers to the additional (8-a) bits of h, and lM refers to the additional (8-b) bits of l. Finally, the first a bits of the generated (a+b) bit verification watermark are replaced with the lower a bits of h, and the other b bits are replaced with the lower b bits of l, so as to realize the embedding of the verification watermark.

与此同时,为了进一步提高水印图像的品质,提出了MSB变换技术以找到一组能够使图像区块失真达到最小的验证水印。通过牺牲一定的计算力,实现一个较高品质的水印图像质量。具体做好如下:At the same time, in order to further improve the quality of watermarked images, MSB transform technology is proposed to find a set of verification watermarks that can minimize the distortion of image blocks. By sacrificing a certain amount of computing power, a higher quality watermark image quality is achieved. Specifically do the following:

Figure BDA0002326081820000011
Figure BDA0002326081820000011

MSBP的主要策略使:在LSBR的基础上,允许hM和lM有一定的变化范围(±1),然后通过运算,从9组组合中找到一组能够使局部区块方差最小化,使得每个局部失真变小,总体上提升了水印图像的品质。The main strategy of MSBP is: On the basis of LSBR, allow h M and l M to have a certain range of variation (±1), and then find a group from 9 groups of combinations that can minimize the variance of the local block through operations, so that Each local distortion becomes smaller, which improves the quality of the watermarked image as a whole.

但是该方法仍存在以下缺点:However, this method still has the following disadvantages:

缺点1:水印图像品质和验证精度可进一步提升。通常地,嵌入越多的验证水印能够实现越好的验证精度,但同时会使得水印图像的品质急剧下降。因此,水印图像品质与嵌入水印长度之间是此消彼长的问题。该方法是目前为止,权衡并实现二者兼容关系的最佳方案,即实现了高达8比特的验证水印嵌入同时实现了大部分水印图像接近30dB的品质。但是仍然存在着部分图像水印品质低于30dB。另一方面也希望水印品质能够有在进一步的提升。Disadvantage 1: The watermark image quality and verification accuracy can be further improved. Generally, the more verification watermarks are embedded, the better the verification accuracy can be achieved, but at the same time, the quality of the watermarked image will drop sharply. Therefore, there is a trade-off between the watermark image quality and the embedded watermark length. This method is the best solution so far to balance and realize the compatibility between the two, that is, it can achieve up to 8-bit verification watermark embedding and at the same time achieve the quality of most watermark images close to 30dB. But there are still some image watermark quality below 30dB. On the other hand, it is also hoped that the watermark quality can be further improved.

缺点2:无法抵挡拼贴攻击(拼贴攻击:是一种从某一已嵌入水印的图像中,复制某一部分并粘贴至另一已嵌入水印的图像中的攻击方式)。该方法中,每个图像区块,通过自身压缩码(部分)计算哈希结果(验证水印),然后以LSB替换的方式实施自嵌入。因此,该方法无法抵挡拼贴攻击。Disadvantage 2: Can't resist collage attack (collage attack: an attack method that copies a part from a watermark-embedded image and pastes it into another watermark-embedded image). In this method, each image block calculates the hash result (verifies the watermark) through its own compression code (partially), and then implements self-embedding in the form of LSB replacement. Therefore, this method cannot withstand collage attacks.

发明内容SUMMARY OF THE INVENTION

(一)要解决的技术问题(1) Technical problems to be solved

为了解决现有技术的上述问题,本发明提供一种验证精度高且能抵挡拼贴攻击的基于AMBTC的图像认证方法。In order to solve the above problems of the prior art, the present invention provides an AMBTC-based image authentication method with high verification accuracy and resistance to collage attacks.

(二)技术方案(2) Technical solutions

为了达到上述目的,本发明采用的主要技术方案包括:In order to achieve the above-mentioned purpose, the main technical scheme adopted in the present invention includes:

一种基于AMBTC的图像认证方法,包括步骤:An AMBTC-based image authentication method, comprising steps:

S1、获取待认证图像,并提取出相应的第一验证水印;S1, obtain the image to be authenticated, and extract the corresponding first verification watermark;

S2、根据所述第一验证水印和预设的规则对所述待认证图像进行图像认证。S2. Perform image authentication on the image to be authenticated according to the first authentication watermark and a preset rule.

(三)有益效果(3) Beneficial effects

本发明的有益效果在于:通过获取待认证图像,并提取出相应的第一验证水印;根据所述第一验证水印和预设的规则对所述待认证图像进行图像认证,提高了验证精度高且能抵挡拼贴攻击。The beneficial effects of the present invention are: by acquiring the image to be authenticated, and extracting the corresponding first verification watermark; image authentication is performed on the image to be authenticated according to the first verification watermark and preset rules, thereby improving the verification accuracy and high And can resist collage attack.

附图说明Description of drawings

图1为本发明实施例的基于AMBTC的图像认证方法流程图;1 is a flowchart of an AMBTC-based image authentication method according to an embodiment of the present invention;

图2为本发明实施例的参考表RT示意图;2 is a schematic diagram of a reference table RT according to an embodiment of the present invention;

图3为本发明实施例的误判解决方案部分示意图;3 is a partial schematic diagram of a misjudgment solution according to an embodiment of the present invention;

图4为本发明实施例的自适应权重重建图像示意图;4 is a schematic diagram of an adaptive weight reconstructed image according to an embodiment of the present invention;

图5为本发明实施例的图像验证结果示意图。FIG. 5 is a schematic diagram of an image verification result according to an embodiment of the present invention.

具体实施方式Detailed ways

为了更好的解释本发明,以便于理解,下面结合附图,通过具体实施方式,对本发明作详细描述。In order to better explain the present invention and facilitate understanding, the present invention will be described in detail below with reference to the accompanying drawings and through specific embodiments.

实施例一Example 1

请参照图1,一种基于AMBTC的图像认证方法,包括步骤:Please refer to Fig. 1, a kind of image authentication method based on AMBTC, including steps:

步骤S1之前还包括:Before step S1, it also includes:

S0、根据原始图像通过AMBTC压缩生成包含第二验证水印的水印图像。S0. Generate a watermark image including the second verification watermark by AMBTC compression according to the original image.

步骤S0具体包括:Step S0 specifically includes:

S01、根据原始图像通过新型变体AMBTC压缩处理后得到相应的AMBTC压缩码;S01. According to the original image, the corresponding AMBTC compression code is obtained after the new variant AMBTC compression processing;

步骤S01具体为:Step S01 is specifically:

S011、将原始图像中每个4*4的图像区块按光栅扫描方式组成一维像素序列,并表示为Ib={b1,b2,…,b16};S011, each 4*4 image block in the original image is formed into a one-dimensional pixel sequence by raster scanning, and is represented as I b ={b 1 ,b 2 ,...,b 16 };

S012、质心初始化,从所述Ib导出U,其中,

Figure BDA0002326081820000041
并使得Ib中每个像素值都包含在U中且U中两两元素之间均不相同,若U的元素个数|U|≥2,则从其中选择两个元素构建一个初始质心集合C={c1,c2},并执行步骤S013;若|U|=1,c1=c2,则执行步骤S016;S012, the centroid is initialized, and U is derived from the I b , wherein,
Figure BDA0002326081820000041
And make each pixel value in I b included in U and the two elements in U are different, if the number of elements in U |U| ≥ 2, select two elements from them to construct an initial centroid set C={c 1 , c 2 }, and go to step S013; if |U|=1, c 1 =c 2 , go to step S016;

S013、分群计算,根据欧几里得定理,将Ib中所有元素分成两群S1和S2,分群的依据为

Figure BDA0002326081820000042
S013. Group calculation, according to Euclid's theorem, divide all elements in I b into two groups S 1 and S 2 , and the basis for the grouping is
Figure BDA0002326081820000042

S014、质心迭代,计算每个群的质心

Figure BDA0002326081820000043
|Sr|表示Sr中元素个数;S014, centroid iteration, calculate the centroid of each group
Figure BDA0002326081820000043
|S r | represents the number of elements in S r ;

S015、根据公式

Figure BDA0002326081820000044
决定迭代是否终止,ε是一个小于0的常量,若不满足,则c1=c′1,c2=c′2,执行步骤S013;否则执行步骤S016;S015. According to the formula
Figure BDA0002326081820000044
Determine whether the iteration is terminated, ε is a constant less than 0, if not satisfied, then c 1 =c' 1 , c 2 =c' 2 , go to step S013; otherwise, go to step S016;

S016、导出AMBTC压缩码:S016. Export AMBTC compression code:

hk=max(c1,c2),h k =max(c 1 ,c 2 ),

lk=min(c1,c2),l k =min(c 1 ,c 2 ),

Figure BDA0002326081820000045
对每个图像区块重复上述步骤,即可得到整个原始图像的AMBTC压缩码
Figure BDA0002326081820000046
其中,hk表示高阶量化水平值,lk表示低阶量化水平值,
Figure BDA0002326081820000047
表示对应图像区块的位图。
Figure BDA0002326081820000045
Repeat the above steps for each image block to get the AMBTC compression code of the entire original image
Figure BDA0002326081820000046
Among them, h k represents the high-order quantization level value, l k represents the low-order quantization level value,
Figure BDA0002326081820000047
A bitmap representing the corresponding image block.

S02、根据所述AMBTC压缩码通过N变体AMBTC压缩处理后得到新的压缩码,并根据所述新的压缩码和位置信息通过hash函数生成相应的第二验证水印;S02, obtain a new compression code after N variant AMBTC compression processing according to the AMBTC compression code, and generate a corresponding second verification watermark by hash function according to the new compression code and position information;

步骤S02具体为:Step S02 is specifically:

S021、生成一4*4的第一参考表RT;S021, generate a 4*4 first reference table RT;

S022、根据第一参数N,将所述AMBTC压缩码

Figure BDA0002326081820000048
的Bk中的前N比特位置腾出,得到新的压缩码
Figure BDA0002326081820000049
并根据所述新的压缩码
Figure BDA00023260818200000410
和位置信息通过hash函数生成相应的N比特的第二验证水印,其中B′k表示压缩处理后的位图。S022, according to the first parameter N, compress the AMBTC code
Figure BDA0002326081820000048
The first N bits in B k are vacated to obtain a new compressed code
Figure BDA0002326081820000049
and according to the new compression code
Figure BDA00023260818200000410
and location information to generate a corresponding N-bit second verification watermark through a hash function, where B′ k represents the compressed bitmap.

S03、根据所述新的压缩码和所述第二验证水印生成水印图像。S03. Generate a watermark image according to the new compression code and the second verification watermark.

步骤S03具体为:Step S03 is specifically:

根据所述新的压缩码和所述第一验证水印通过位元替换的方式生成水印图像。A watermark image is generated by bit replacement according to the new compression code and the first verification watermark.

S1、获取待认证图像,并提取出相应的第一验证水印;S1, obtain the image to be authenticated, and extract the corresponding first verification watermark;

步骤S1还包括:Step S1 also includes:

根据第二参数N和第二参考表RT,从待认证图像中计算得到第三验证水印。According to the second parameter N and the second reference table RT, the third verification watermark is calculated from the image to be authenticated.

S2、根据所述第一验证水印和预设的规则对所述待认证图像进行图像认证。S2. Perform image authentication on the image to be authenticated according to the first authentication watermark and a preset rule.

步骤S2具体为:Step S2 is specifically:

根据所述第一验证水印、第三验证水印和预设的规则对所述待认证图像进行图像认证。Image authentication is performed on the image to be authenticated according to the first verification watermark, the third verification watermark and a preset rule.

所述的根据所述第一验证水印、第三验证水印和预设的规则对所述待认证图像进行图像认具体为:The image recognition of the to-be-authenticated image according to the first verification watermark, the third verification watermark and the preset rule is as follows:

判断所述第一验证水印与所述第三验证水印是否等同,若是,则判断所述待认证图像未被篡改,否则,判断所述待认证图像已被篡改。It is judged whether the first verification watermark is equal to the third verification watermark, and if so, it is judged that the image to be authenticated has not been tampered with; otherwise, it is judged that the image to be authenticated has been tampered with.

实施例二Embodiment 2

本实施例和实施例一的区别在于,本实施例将结合具体的应用场景进一步说明本发明上述基于AMBTC的图像认证方法是如何实现的:The difference between this embodiment and Embodiment 1 is that this embodiment will further illustrate how the above-mentioned AMBTC-based image authentication method of the present invention is implemented in combination with specific application scenarios:

本发明主要包括3个方面:水印的生成、水印嵌入和图像验证与重建过程;The present invention mainly includes three aspects: watermark generation, watermark embedding and image verification and reconstruction process;

1、水印的生成1. Generation of watermark

当原始图像I通过新型变体AMBTC压缩处理后相应的AMBTC压缩码

Figure BDA0002326081820000051
根据所述AMBTC压缩码通过N变体AMBTC压缩处理后得到新的压缩码,并根据所述新的压缩码和位置信息通过hash函数生成相应的第二验证水印;具体地,对于每一个区块将其对应(hk,lk,B′k)和当前区块位置信息k喂给hash函数以获取第二验证水印ack,其长度为N,且ack=fN(hk,lk,B′k,k).When the original image I is compressed by the new variant AMBTC, the corresponding AMBTC compression code
Figure BDA0002326081820000051
According to the AMBTC compression code, a new compression code is obtained after N-variant AMBTC compression processing, and a corresponding second verification watermark is generated through a hash function according to the new compression code and location information; Specifically, for each block Feed its corresponding (h k , l k , B′ k ) and the current block position information k to the hash function to obtain the second verification watermark ac k , whose length is N, and ac k =f N (h k ,l k ,B′ k ,k).

2、水印的嵌入2. Embedding of watermarks

(1)新型变体AMBTC压缩处理(1) New variant AMBTC compression processing

对于每一个4*4的图像区块,将其16个像素按光栅扫描方式组成一维像素序列,并表示为Ib={b1,b2,…,b16}。接下来,新型AMBTC压缩处理可描述如下:For each 4*4 image block, its 16 pixels are formed into a one-dimensional pixel sequence in a raster scanning manner, and expressed as I b ={b 1 ,b 2 ,...,b 16 }. Next, the new AMBTC compression process can be described as follows:

1)质心初始化,从Ib中导出U,其中,

Figure BDA0002326081820000061
并使得Ib中出现的每个像素值都含在U中且U中两两元素之间均不相同,若U的元素个数|U|≥2,则从其中选择两个元素构建一个初始质心集合C={c1,c2},并跳转至步骤2);若|U|=1,c1=c2,并跳转至步骤5);1) Centroid initialization, derive U from I b , where,
Figure BDA0002326081820000061
And make each pixel value appearing in I b included in U and the two elements in U are different, if the number of elements in U |U|≥2 , select two elements from them to construct an initial The centroid set C={c 1 , c 2 }, and jump to step 2); if |U|=1, c 1 =c 2 , and jump to step 5);

2)分群计算,根据欧几里得定理,将Ib中所有元素分成两群S1和S2,分群的依据为

Figure BDA0002326081820000062
其中,d(bv,cr)=(bv-cr)2.,1≤v≤16,1≤r≤2。2) Grouping calculation, according to Euclid's theorem, all elements in I b are divided into two groups S 1 and S 2 , and the basis for the grouping is
Figure BDA0002326081820000062
Wherein, d(b v , cr ) =(b v -c r ) 2 . 1≤v≤16, 1≤r≤2.

3)质心迭代,计算每个群的质心

Figure BDA0002326081820000063
|Sr|表示Sr中元素个数;3) Centroid iteration, calculating the centroid of each group
Figure BDA0002326081820000063
|S r | represents the number of elements in S r ;

4)判断是否终止,根据公式

Figure BDA0002326081820000064
决定迭代是否终止,ε是一个小于0的常量,若不满足,则c1=c′1,c2=c′2,跳转回步骤2);否则执行步骤5):4) Determine whether to terminate, according to the formula
Figure BDA0002326081820000064
Determine whether the iteration is terminated, ε is a constant less than 0, if not satisfied, then c 1 =c' 1 , c 2 =c' 2 , jump back to step 2); otherwise, go to step 5):

5)导出AMBTC压缩码:5) Export AMBTC compression code:

hk=max(c1,c2),h k =max(c 1 ,c 2 ),

lk=min(c1,c2),l k =min(c 1 ,c 2 ),

Figure BDA0002326081820000065
对每个图像区块重复上述步骤,即可得到整个原始图像的AMBTC压缩码
Figure BDA0002326081820000066
其中,hk表示高阶量化水平值,lk表示低阶量化水平值,
Figure BDA0002326081820000067
表示对应图像区块的位图。
Figure BDA0002326081820000065
Repeat the above steps for each image block to get the AMBTC compression code of the entire original image
Figure BDA0002326081820000066
Among them, h k represents the high-order quantization level value, l k represents the low-order quantization level value,
Figure BDA0002326081820000067
A bitmap representing the corresponding image block.

(2)N变体AMBTC压缩处理(2) N variant AMBTC compression processing

当获得

Figure BDA0002326081820000071
通过实施N变体AMBTC技术,从Bk腾出N比特的空间,用于隐藏第二验证水印,具体步骤如下:when obtained
Figure BDA0002326081820000071
By implementing the N variant AMBTC technology, N bits of space are freed from B k to hide the second verification watermark. The specific steps are as follows:

1)生成一4*4的第一参考表RT,如图2(a)所示,其中(a)Bk;(b)参考表RT;(c)B′k(N=2);(d)B′k(N=8);1) Generate a 4*4 first reference table RT, as shown in FIG. 2(a), wherein (a) B k ; (b) reference table RT; (c) B′ k (N=2); ( d) B'k (N=8);

2)根据第一参数N,将所述AMBTC压缩码

Figure BDA0002326081820000072
的Bk中的前N比特位置腾出;2) According to the first parameter N, compress the AMBTC code
Figure BDA0002326081820000072
The first N bit positions in B k are vacated;

其中,前N比特位置的确定规则:根据RT图2(b)中六边形框内数字的大小从小到大确认。图2(c)是N为2时的B′k;图2(d)是N为8时的B′k,‘NA’表示腾出的位置。Among them, the determination rule for the position of the first N bits: confirm according to the size of the numbers in the hexagonal box in RT Figure 2(b) from small to large. Fig. 2(c) is B' k when N is 2; Fig. 2(d) is B' k when N is 8, 'NA' indicates the vacated position.

3)对每个区块压缩码实施上述过程,得到新的压缩码

Figure BDA0002326081820000073
并根据所述新的压缩码和位置信息通过hash函数生成相应的N比特的第第二验证水印,其中B′k表示压缩处理后的位图。3) Implement the above process for each block compressed code to obtain a new compressed code
Figure BDA0002326081820000073
And according to the new compression code and position information, a corresponding N-bit second verification watermark is generated through a hash function, where B′ k represents the compressed bitmap.

(3)当获得新的压缩码

Figure BDA0002326081820000074
和相应的N比特的第二验证水印后,通过位元替换的形式,将N比特验证水印依次替换中B′k腾出的N个位置(顺序根据RT中蓝色六边形框内数字的大小从小到大确认),从而实现第二验证水印的嵌入,得到水印图像
Figure BDA0002326081820000075
(3) When a new compressed code is obtained
Figure BDA0002326081820000074
After and the corresponding N-bit second verification watermark, the N-bit verification watermark is replaced in turn in the N positions vacated by B'k in the form of bit substitution (the order is based on the number in the blue hexagonal frame in RT). The size is confirmed from small to large), so as to realize the embedding of the second verification watermark, and obtain the watermark image
Figure BDA0002326081820000075

3、图像验证与重建过程3. Image verification and reconstruction process

1)图像验证1) Image verification

第一阶段:The first stage:

假设接收端接收到的AMBTC压缩码为

Figure BDA0002326081820000076
对于每一对
Figure BDA0002326081820000077
实施图像验证的步骤如下:Assume that the AMBTC compression code received by the receiver is
Figure BDA0002326081820000076
for each pair
Figure BDA0002326081820000077
The steps to implement image validation are as follows:

1)以同样的方式生成相应RT,(或发送方和接收方共享)。1) The corresponding RT is generated in the same way, (or shared by sender and receiver).

2)从

Figure BDA00023260818200000710
中提取前N个比特位元(N个比特位元的提取顺序根据RT中六边形框内数字的大小从小到大确认),并串接成提取的验证水印,记为第一验证水印Eack。2) From
Figure BDA00023260818200000710
Extract the first N bits (the extraction order of N bits is confirmed according to the size of the numbers in the hexagonal frame in RT from small to large), and concatenate them into the extracted verification watermark, which is marked as the first verification watermark Eac k .

3)根据所述第二参数N和第二参考表RT,将

Figure BDA0002326081820000078
压缩成
Figure BDA0002326081820000079
并根据水印产生的方法,并从待认证图像中计算得到第三验证水印,即Rack。3) According to the second parameter N and the second reference table RT, the
Figure BDA0002326081820000078
compressed into
Figure BDA0002326081820000079
And according to the method of watermark generation, the third verification watermark, namely Rack , is calculated from the image to be authenticated.

具体地,所述第二验证水印和第三验证水印生成过程相同,区别在于,若是水印图像被篡改,则第二验证水印和第三验证水印不相同,否则,计算得到的第三验证水印与水印生成过程中得到的第二验证水印相同,(所述第二参数N和第二参考表RT)与(第一参数N和第一参考表RT)的区别在于拥有者是不一样的,但是只有当他们数值是一样的才能够实现准确的验证,也就是N和RT是发送方和接受方双方共享的;Specifically, the generation process of the second verification watermark and the third verification watermark are the same, the difference is that if the watermark image is tampered with, the second verification watermark and the third verification watermark are not the same, otherwise, the calculated third verification watermark is the same as that of the third verification watermark. The second verification watermark obtained during the watermark generation process is the same, the difference between (the second parameter N and the second reference table RT) and (the first parameter N and the first reference table RT) is that the owner is different, but Only when their values are the same can accurate verification be achieved, that is, N and RT are shared by both the sender and the receiver;

4)若图像没有被篡改,则Eack应与Rack等同。因此通过比较Eack(第一水印)和Rack(第三水印),若相等,则该区块认为没有被篡改;反之,则认为该区块被篡改。4) If the image has not been tampered with, Eack should be equivalent to Rack . Therefore, by comparing Eack (first watermark) and Rack (third watermark), if they are equal, the block is considered to have not been tampered with; otherwise, it is considered that the block has been tampered with.

对每个区块都实施上述过程之后,可得到整个图像的篡改检测结果,记为TM。After the above process is performed for each block, the tampering detection result of the entire image can be obtained, which is recorded as TM.

第二阶段:second stage:

为了解决第一阶段出现的误判情况,在TM上实施第二阶段篡改验证。基本原则是:以某一区块为中心,在其周围3*3的小区域内。将该区域划分为4个部分,成为左,上,右,下,对应于图3(a)-(d)灰色黑色区域。每一部分是一个2*3或3*2的矩形区域。黑色表示在第一阶段鉴定为被篡改区块,灰白色表示在第一阶段鉴定为无篡改区块。‘*’表示当前需要被鉴定的区块。若当前区块的上述4个部分中(左,上,右,下),存在某一区域中超过4/6的区块鉴定为被篡改区块,则进一步判断该区块为篡改区块,如图3(e)-(f)所示。In order to solve the misjudgment situation in the first stage, the second stage tamper verification is implemented on the TM. The basic principle is: take a block as the center, in a small area of 3*3 around it. The area is divided into 4 parts, which are left, upper, right, and lower, corresponding to the gray-black areas in Fig. 3(a)-(d). Each part is a 2*3 or 3*2 rectangular area. Black indicates a tampered block identified in the first stage, and gray indicates a non-tampered block identified in the first stage. '*' indicates the block that currently needs to be authenticated. If more than 4/6 of the blocks in the above-mentioned 4 parts of the current block (left, top, right, bottom) are identified as tampered blocks, it is further judged that the block is a tampered block, As shown in Figure 3(e)-(f).

实施上述两阶段的图像验证过程,即可获得最终的验证结果TM。By implementing the above two-stage image verification process, the final verification result TM can be obtained.

(2)图像重建(2) Image reconstruction

如需要重建压缩图像,可根据如下步骤重建:If you need to reconstruct the compressed image, you can reconstruct it according to the following steps:

对于某一待重建像素,以其3*3范围内的已重建像素(根据压缩码可重建部分像素)为参考,利用自适应权重的策略,重建自身像素。为了方便,假设待重建像素为b’x,其3*3范围内的已重建像素为X={b’1,b’2,…,b’N}。则当前b’x的像素值可预估为:For a certain pixel to be reconstructed, it uses the reconstructed pixels in the range of 3*3 (part of the pixels can be reconstructed according to the compression code) as a reference, and uses the strategy of adaptive weight to reconstruct its own pixels. For convenience, it is assumed that the pixel to be reconstructed is b' x , and the reconstructed pixels within the range of 3*3 are X={b' 1 , b' 2 , . . . , b' N }. Then the pixel value of the current b' x can be estimated as:

Figure BDA0002326081820000091
Figure BDA0002326081820000091

其中,

Figure BDA0002326081820000092
Figure BDA0002326081820000094
为分配到xt的方差。in,
Figure BDA0002326081820000092
Figure BDA0002326081820000094
is the variance assigned to xt .

图4给出了相关示例。A related example is given in Figure 4.

针对缺点1,事实上图像区域具有局部相似性,因此提出了进一步压缩位图位元已腾出空间隐藏验证水印的策略。从而可实现N比特的验证能力,N=0-10。首先,相对于洪维恩的方法,将验证精度提高了2比特,并且提出了一个新型的误判解决方法,确保了高精度和准确的图像验证结果。同时为了确保重建图像的品质,我们提出了两种方法优化:第一是提出了新型的AMBTC压缩策略;第二提出了自适应权重策略预估待测像素;从而确保的图像品质。表1给出了本发明和洪维恩等人方法的图像品质实验结果对比。For shortcoming 1, in fact, the image regions have local similarity, so a strategy is proposed to further compress the bitmap bits to make room to hide the verification watermark. Thus, the verification capability of N bits can be realized, N=0-10. First, compared with Hong Weien's method, the verification accuracy is improved by 2 bits, and a novel misjudgment solution is proposed to ensure high-precision and accurate image verification results. At the same time, in order to ensure the quality of the reconstructed image, we propose two optimization methods: the first is to propose a new AMBTC compression strategy; the second is to propose an adaptive weighting strategy to estimate the pixels to be tested, thereby ensuring the best image quality. Table 1 shows the comparison of the experimental results of the image quality between the present invention and the method of Hong Weien et al.

表1.本发明与洪维恩等人方法的图像品质对比(N=2,4,6,8,10)Table 1. Image quality comparison between the present invention and the method of Hong Weien et al. (N=2, 4, 6, 8, 10)

Figure BDA0002326081820000093
Figure BDA0002326081820000093

‘-’:表示该方法未提供或无条件实现。'-': Indicates that the method is not provided or unconditionally implemented.

针对缺点2,无法抵挡拼贴攻击。洪维恩等人的方法中,每个图像区块,通过自身压缩码(部分)计算哈希结果(验证水印),然后以LSB替换的方式实施自嵌入。因此,该方法无法抵挡拼贴攻击。而本发明进一步将区块的位置信息喂入哈希函数,确保能够抵挡拼贴攻击。同时,在验证阶段,提出了一种新型的误判解决方案,进一步提升了图像验证效果。For disadvantage 2, it cannot resist collage attacks. In the method of Hong Weien et al., each image block calculates the hash result (verifies the watermark) through its own compression code (partially), and then implements self-embedding in the form of LSB replacement. Therefore, this method cannot withstand collage attacks. In the present invention, the location information of the block is further fed into the hash function to ensure that the collage attack can be resisted. At the same time, in the verification stage, a new type of misjudgment solution is proposed, which further improves the image verification effect.

其中:图5(a)为篡改后的压缩图像,共被篡改了5个区域(5种类型攻击),具体篡改区域如图5(a)所示。Among them: Figure 5(a) is the tampered compressed image, and 5 areas (5 types of attacks) have been tampered with, and the specific tampered area is shown in Figure 5(a).

A:篡改该区域的量化水平的值;A: tamper with the value of the quantization level of the area;

B:篡改该区域的位图的原始比特;B: tamper with the original bits of the bitmap of the area;

C:篡改该区域的位图的验证水印比特;C: tamper with the verification watermark bits of the bitmap of this area;

D:拼贴攻击;D: collage attack;

E:复制粘贴攻击(一朵花);E: copy-paste attack (a flower);

黑色部分表示:被篡改区域或被检测为篡改区域,白色部分表示未背篡改区域或被检测为未篡改区域。The black part represents the tampered area or the detected area, and the white part represents the untampered area or detected as the untampered area.

图5.图像验证结果示意图(N=10):(a)被篡改的LeNa图像;Figure 5. Schematic diagram of image verification results (N=10): (a) tampered LeNa image;

本发明的验证结果:(b)第一阶段(TDR=99.87%);(f)第一阶段(TDR=99.97%);(d)未被正确检测的区块;(e)原始篡改区域;Verification results of the present invention: (b) first stage (TDR=99.87%); (f) first stage (TDR=99.97%); (d) blocks not correctly detected; (e) original tampered area;

洪维恩方法的验证结果:(f)第一阶段(TDR=87.35%);(g)第一阶段(TDR=87.61%);(h)未被正确检测的区块。Verification results of Hong Weien's method: (f) first stage (TDR=87.35%); (g) first stage (TDR=87.61%); (h) blocks that were not detected correctly.

以上所述仅为本发明的实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等同变换,或直接或间接运用在相关的技术领域,均同理包括在本发明的专利保护范围内。The above descriptions are only examples of the present invention, and are not intended to limit the scope of the patent of the present invention. Any equivalent transformations made by using the contents of the description and drawings of the present invention, or directly or indirectly applied in related technical fields, are similarly included in the within the scope of patent protection of the present invention.

Claims (6)

1. An AMBTC-based image authentication method is characterized by comprising the following steps:
s1, acquiring an image to be authenticated, and extracting a corresponding first verification watermark;
s2, performing image authentication on the image to be authenticated according to the first verification watermark and a preset rule;
step S1 is preceded by:
s0, generating a watermark image containing a second verification watermark through AMBTC compression according to the original image;
step S0 specifically includes:
s01, obtaining corresponding AMBTC compression codes after new variant AMBTC compression processing according to the original image;
s02, obtaining a new compression code through N-variant AMBTC compression processing according to the AMBTC compression code, and generating a corresponding second verification watermark through a hash function according to the new compression code and the position information;
s03, generating a watermark image according to the new compression code and the second verification watermark;
step S01 specifically includes:
s011, forming a one-dimensional pixel sequence by each 4 x 4 image block in the original image according to a raster scanning mode, and expressing the one-dimensional pixel sequence as Ib={b1,b2,…,b16};
S012, centroid initialization, from IbAnd deriving U, wherein,
Figure FDA0003557657320000011
and make IbWherein each pixel value is contained in U, and every two elements in U are different, if the number | U | of the elements of U is ≧ 2, two elements are selected from the U to construct an initial centroid set C ═ C1,c2And step S013 is executed; if | U | ═ 1, c1=c2Then, go to step S016;
s013, grouping calculation, according to Euclidean theorem, dividing IbAll elements in the group S1And S2The basis of grouping is
Figure FDA0003557657320000012
Wherein d (b)v,cr)=(bv-cr)2,1≤v≤16,1≤r≤2;
S014, iteration of the centroids, calculating the centroids of each group
Figure FDA0003557657320000013
bv∈Sr,|SrI represents SrThe number of middle elements;
s015, according to the formula | c1-c′2|≤ε&|c2-c′2Determining whether iteration is terminated or not, wherein epsilon is a constant larger than 0, if not, c1=c′1,c2=c′2Step S013 is executed; otherwise, executing step S016;
s016, deriving an AMBTC compression code:
hk=max(c1,c2),
lk=min(c1,c2),
Figure FDA0003557657320000021
repeating the above steps for each image block to obtain the AMBTC compression code of the whole original image
Figure FDA0003557657320000022
Wherein h iskRepresenting a high order quantization level value,/kRepresenting the value of the low-order quantization level,
Figure FDA0003557657320000023
a bitmap representing the corresponding image blocks.
2. The AMBTC-based image authentication method according to claim 1, wherein step S02 is specifically:
s021, generating a first reference table RT of 4 x 4;
s022, based on the first parameter N,compressing the AMBTC
Figure FDA0003557657320000024
B of (A)kThe first N bit positions are vacated to obtain new compression codes
Figure FDA0003557657320000025
And based on the new compression code
Figure FDA0003557657320000026
Generating a corresponding N-bit second verification watermark by a hash function according to the position information, wherein Bk' denotes a bitmap after compression processing.
3. The AMBTC-based image authentication method according to claim 1, wherein step S03 specifically includes:
and generating a watermark image by a bit replacement mode according to the new compression code and the second verification watermark.
4. The AMBTC-based image authentication method according to claim 1, wherein step S1 further includes:
and calculating to obtain a third verification watermark from the image to be authenticated according to the second parameter N and the second reference table RT.
5. The AMBTC-based image authentication method according to claim 4, wherein the step S2 is specifically as follows:
and performing image authentication on the image to be authenticated according to the first verification watermark, the third verification watermark and a preset rule.
6. The AMBTC-based image authentication method according to claim 5, wherein the image recognition of the image to be authenticated according to the first verification watermark, the third verification watermark and a preset rule is specifically:
and judging whether the first verification watermark and the third verification watermark are identical, if so, judging that the image to be authenticated is not tampered, otherwise, judging that the image to be authenticated is tampered.
CN201911316925.6A 2019-12-19 2019-12-19 An Image Authentication Method Based on AMBTC Active CN111127290B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911316925.6A CN111127290B (en) 2019-12-19 2019-12-19 An Image Authentication Method Based on AMBTC

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911316925.6A CN111127290B (en) 2019-12-19 2019-12-19 An Image Authentication Method Based on AMBTC

Publications (2)

Publication Number Publication Date
CN111127290A CN111127290A (en) 2020-05-08
CN111127290B true CN111127290B (en) 2022-05-03

Family

ID=70500796

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911316925.6A Active CN111127290B (en) 2019-12-19 2019-12-19 An Image Authentication Method Based on AMBTC

Country Status (1)

Country Link
CN (1) CN111127290B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103426141A (en) * 2013-08-09 2013-12-04 深圳大学 Method and system for authenticating image contents
CN105812816A (en) * 2016-03-17 2016-07-27 安徽大学 Compression encryption authentication joint coding method
CN108111855A (en) * 2017-12-21 2018-06-01 北京工业大学 A kind of adaptive code flat blocks based on quaternary tree block coding method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120014447A1 (en) * 2010-07-16 2012-01-19 Sharp Laboratories Of America, Inc. System for low resolution power reduction with high resolution deblocking

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103426141A (en) * 2013-08-09 2013-12-04 深圳大学 Method and system for authenticating image contents
CN105812816A (en) * 2016-03-17 2016-07-27 安徽大学 Compression encryption authentication joint coding method
CN108111855A (en) * 2017-12-21 2018-06-01 北京工业大学 A kind of adaptive code flat blocks based on quaternary tree block coding method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"TSIA_ A Novel Image Authentication Scheme fir AMBTC-Based Compressed Images Using Turtle Shell Based Reference Matrix";Chih-Cheng Chen, Chin-Chen Chang, Chia-Chen Lin, Guo-Dong Su;《IEEE Access》;20191025;全文 *

Also Published As

Publication number Publication date
CN111127290A (en) 2020-05-08

Similar Documents

Publication Publication Date Title
CN105741224B (en) Reversible Watermarking Algorithm Based on PVO and Adaptive Block Partitioning
CN101833746B (en) Embedding method and extracting method of reversible watermark in digital image
Thabit et al. Medical image authentication using SLT and IWT schemes
CN108416724B (en) A Reversible Information Hiding Method Based on Multiple Predictors
CN101419702B (en) Semi-fragile watermarking method for color image tamper localization and recovery
CN101163188B (en) Image processing apparatus, image reading apparatus, image forming apparatus, image processing method
CN104778651A (en) Digital image authentication method based on super-pixels
JP5974589B2 (en) Image processing apparatus and program
CN106530203B (en) A kind of adaptive steganography method of jpeg image based on Texture complication
TW201110701A (en) Image processing method combining compression and watermark techniques
US11915336B2 (en) Method and device for watermark-based image integrity verification
CN109741233B (en) Reversible watermark embedding and extracting method
CN113538201B (en) Ceramic watermarking model training method, device and embedding method based on bottom changing mechanism
CN110796582A (en) A reversible clear watermarking method and device based on vector graphics compression
CN118864218B (en) Depth separable convolution multimedia watermark embedding and extracting method
CN111127290B (en) An Image Authentication Method Based on AMBTC
CN108898542A (en) A kind of insertion and extracting method of reversible water mark
CN107346528A (en) A kind of distorted image detection method based on the reversible fragile watermark of digraph
CN107241597A (en) A kind of reversible information hidden method of combination quaternary tree adaptive coding
CN111583086B (en) AMBTC-based self-adaptive digital image watermark and restoration method
CN110148079B (en) A method of digital image tampering detection, localization and self-recovery
CN115690014A (en) Medical image tampering detection and self-recovery method based on texture degree cross embedding
Zhou et al. An unsolvable pixel reduced authentication method for color images with grayscale invariance
Chalamala et al. Local binary patterns for digital image watermarking
CN104486524B (en) The method whether detection image undergoes compression quality identical JPEG compression twice

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: No.1 campus new village, Rongcheng Town, Fuqing City, Fuzhou City, Fujian Province

Patentee after: Fujian Normal University of Technology

Country or region after: China

Address before: No.1 campus new village, Rongcheng Town, Fuqing City, Fuzhou City, Fujian Province

Patentee before: FUQING BRANCH OF FUJIAN NORMAL University

Country or region before: China

CP03 Change of name, title or address