CN111127290B - An Image Authentication Method Based on AMBTC - Google Patents
An Image Authentication Method Based on AMBTC Download PDFInfo
- Publication number
- CN111127290B CN111127290B CN201911316925.6A CN201911316925A CN111127290B CN 111127290 B CN111127290 B CN 111127290B CN 201911316925 A CN201911316925 A CN 201911316925A CN 111127290 B CN111127290 B CN 111127290B
- Authority
- CN
- China
- Prior art keywords
- image
- watermark
- ambtc
- verification
- authenticated
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000012795 verification Methods 0.000 claims abstract description 79
- 238000007906 compression Methods 0.000 claims description 43
- 230000006835 compression Effects 0.000 claims description 42
- 238000013139 quantization Methods 0.000 claims description 9
- 238000004364 calculation method Methods 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 5
- 230000003044 adaptive effect Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0057—Compression invariant watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0065—Extraction of an embedded watermark; Reliable detection
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
本发明提供的一种基于AMBTC的图像认证方法,通过获取待认证图像,并提取出相应的第一验证水印;根据所述第一验证水印和预设的规则对所述待认证图像进行图像认证,提高了验证精度高且能抵挡拼贴攻击。
The present invention provides an AMBTC-based image authentication method, by acquiring an image to be authenticated, and extracting a corresponding first verification watermark; image authentication is performed on the to-be-authenticated image according to the first verification watermark and preset rules , which improves the verification accuracy and resists collage attacks.
Description
技术领域technical field
本发明涉及图像处理技术领域,特别涉及一种基于AMBTC的图像认证方法。The invention relates to the technical field of image processing, in particular to an AMBTC-based image authentication method.
背景技术Background technique
2018年,洪维恩等人在symmetry期刊中提出Detectability Improved TamperDetection Scheme for Absolute Moment Block Truncation(一种有效的AMBTC压缩图像认证方案),共包含两个策略:LSBR和MSBP。在LSBR策略中,首先利用传统AMBTC技术对图像进行压缩得到AMBTC压缩码。这里,假设某一组压缩码为(h,l,B)。其中,h和l分别成为8位元的高量化值和低量化值,B为该图像区块对应的位图。在LSBR方案中,将h的低a位元和l的低b位元腾出并用于携带(a+b)比特的验证水印ac。验证水印ac的计算如下公示所示:In 2018, Hong Weien et al. proposed Detectability Improved TamperDetection Scheme for Absolute Moment Block Truncation (an effective AMBTC compressed image authentication scheme) in the journal Symmetry, which includes two strategies: LSBR and MSBP. In the LSBR strategy, the traditional AMBTC technology is used to compress the image to obtain the AMBTC compression code. Here, it is assumed that a certain set of compressed codes is (h, l, B). Wherein, h and l become the high quantization value and the low quantization value of 8 bits respectively, and B is the bitmap corresponding to the image block. In the LSBR scheme, the lower a bits of h and the lower b bits of l are vacated and used to carry the verification watermark ac of (a+b) bits. The calculation of the verification watermark ac is shown in the following announcement:
ac=fa+b(hM,lM,B),ac=f a+b (h M , l M , B),
其中,fa+b(·)是一个哈希运算并且输出长度为(a+b)比特。hM是指h的另外(8-a)位元,lM指l的另外(8-b)位元。最后,将产生的(a+b)比特验证水印的前a个比特替换h的低a位元,将另外b个比特替换l的低b位元,实现验证水印的嵌入。where f a+b (·) is a hash operation and the output length is (a+b) bits. hM refers to the additional (8-a) bits of h, and lM refers to the additional (8-b) bits of l. Finally, the first a bits of the generated (a+b) bit verification watermark are replaced with the lower a bits of h, and the other b bits are replaced with the lower b bits of l, so as to realize the embedding of the verification watermark.
与此同时,为了进一步提高水印图像的品质,提出了MSB变换技术以找到一组能够使图像区块失真达到最小的验证水印。通过牺牲一定的计算力,实现一个较高品质的水印图像质量。具体做好如下:At the same time, in order to further improve the quality of watermarked images, MSB transform technology is proposed to find a set of verification watermarks that can minimize the distortion of image blocks. By sacrificing a certain amount of computing power, a higher quality watermark image quality is achieved. Specifically do the following:
MSBP的主要策略使:在LSBR的基础上,允许hM和lM有一定的变化范围(±1),然后通过运算,从9组组合中找到一组能够使局部区块方差最小化,使得每个局部失真变小,总体上提升了水印图像的品质。The main strategy of MSBP is: On the basis of LSBR, allow h M and l M to have a certain range of variation (±1), and then find a group from 9 groups of combinations that can minimize the variance of the local block through operations, so that Each local distortion becomes smaller, which improves the quality of the watermarked image as a whole.
但是该方法仍存在以下缺点:However, this method still has the following disadvantages:
缺点1:水印图像品质和验证精度可进一步提升。通常地,嵌入越多的验证水印能够实现越好的验证精度,但同时会使得水印图像的品质急剧下降。因此,水印图像品质与嵌入水印长度之间是此消彼长的问题。该方法是目前为止,权衡并实现二者兼容关系的最佳方案,即实现了高达8比特的验证水印嵌入同时实现了大部分水印图像接近30dB的品质。但是仍然存在着部分图像水印品质低于30dB。另一方面也希望水印品质能够有在进一步的提升。Disadvantage 1: The watermark image quality and verification accuracy can be further improved. Generally, the more verification watermarks are embedded, the better the verification accuracy can be achieved, but at the same time, the quality of the watermarked image will drop sharply. Therefore, there is a trade-off between the watermark image quality and the embedded watermark length. This method is the best solution so far to balance and realize the compatibility between the two, that is, it can achieve up to 8-bit verification watermark embedding and at the same time achieve the quality of most watermark images close to 30dB. But there are still some image watermark quality below 30dB. On the other hand, it is also hoped that the watermark quality can be further improved.
缺点2:无法抵挡拼贴攻击(拼贴攻击:是一种从某一已嵌入水印的图像中,复制某一部分并粘贴至另一已嵌入水印的图像中的攻击方式)。该方法中,每个图像区块,通过自身压缩码(部分)计算哈希结果(验证水印),然后以LSB替换的方式实施自嵌入。因此,该方法无法抵挡拼贴攻击。Disadvantage 2: Can't resist collage attack (collage attack: an attack method that copies a part from a watermark-embedded image and pastes it into another watermark-embedded image). In this method, each image block calculates the hash result (verifies the watermark) through its own compression code (partially), and then implements self-embedding in the form of LSB replacement. Therefore, this method cannot withstand collage attacks.
发明内容SUMMARY OF THE INVENTION
(一)要解决的技术问题(1) Technical problems to be solved
为了解决现有技术的上述问题,本发明提供一种验证精度高且能抵挡拼贴攻击的基于AMBTC的图像认证方法。In order to solve the above problems of the prior art, the present invention provides an AMBTC-based image authentication method with high verification accuracy and resistance to collage attacks.
(二)技术方案(2) Technical solutions
为了达到上述目的,本发明采用的主要技术方案包括:In order to achieve the above-mentioned purpose, the main technical scheme adopted in the present invention includes:
一种基于AMBTC的图像认证方法,包括步骤:An AMBTC-based image authentication method, comprising steps:
S1、获取待认证图像,并提取出相应的第一验证水印;S1, obtain the image to be authenticated, and extract the corresponding first verification watermark;
S2、根据所述第一验证水印和预设的规则对所述待认证图像进行图像认证。S2. Perform image authentication on the image to be authenticated according to the first authentication watermark and a preset rule.
(三)有益效果(3) Beneficial effects
本发明的有益效果在于:通过获取待认证图像,并提取出相应的第一验证水印;根据所述第一验证水印和预设的规则对所述待认证图像进行图像认证,提高了验证精度高且能抵挡拼贴攻击。The beneficial effects of the present invention are: by acquiring the image to be authenticated, and extracting the corresponding first verification watermark; image authentication is performed on the image to be authenticated according to the first verification watermark and preset rules, thereby improving the verification accuracy and high And can resist collage attack.
附图说明Description of drawings
图1为本发明实施例的基于AMBTC的图像认证方法流程图;1 is a flowchart of an AMBTC-based image authentication method according to an embodiment of the present invention;
图2为本发明实施例的参考表RT示意图;2 is a schematic diagram of a reference table RT according to an embodiment of the present invention;
图3为本发明实施例的误判解决方案部分示意图;3 is a partial schematic diagram of a misjudgment solution according to an embodiment of the present invention;
图4为本发明实施例的自适应权重重建图像示意图;4 is a schematic diagram of an adaptive weight reconstructed image according to an embodiment of the present invention;
图5为本发明实施例的图像验证结果示意图。FIG. 5 is a schematic diagram of an image verification result according to an embodiment of the present invention.
具体实施方式Detailed ways
为了更好的解释本发明,以便于理解,下面结合附图,通过具体实施方式,对本发明作详细描述。In order to better explain the present invention and facilitate understanding, the present invention will be described in detail below with reference to the accompanying drawings and through specific embodiments.
实施例一Example 1
请参照图1,一种基于AMBTC的图像认证方法,包括步骤:Please refer to Fig. 1, a kind of image authentication method based on AMBTC, including steps:
步骤S1之前还包括:Before step S1, it also includes:
S0、根据原始图像通过AMBTC压缩生成包含第二验证水印的水印图像。S0. Generate a watermark image including the second verification watermark by AMBTC compression according to the original image.
步骤S0具体包括:Step S0 specifically includes:
S01、根据原始图像通过新型变体AMBTC压缩处理后得到相应的AMBTC压缩码;S01. According to the original image, the corresponding AMBTC compression code is obtained after the new variant AMBTC compression processing;
步骤S01具体为:Step S01 is specifically:
S011、将原始图像中每个4*4的图像区块按光栅扫描方式组成一维像素序列,并表示为Ib={b1,b2,…,b16};S011, each 4*4 image block in the original image is formed into a one-dimensional pixel sequence by raster scanning, and is represented as I b ={b 1 ,b 2 ,...,b 16 };
S012、质心初始化,从所述Ib导出U,其中,并使得Ib中每个像素值都包含在U中且U中两两元素之间均不相同,若U的元素个数|U|≥2,则从其中选择两个元素构建一个初始质心集合C={c1,c2},并执行步骤S013;若|U|=1,c1=c2,则执行步骤S016;S012, the centroid is initialized, and U is derived from the I b , wherein, And make each pixel value in I b included in U and the two elements in U are different, if the number of elements in U |U| ≥ 2, select two elements from them to construct an initial centroid set C={c 1 , c 2 }, and go to step S013; if |U|=1, c 1 =c 2 , go to step S016;
S013、分群计算,根据欧几里得定理,将Ib中所有元素分成两群S1和S2,分群的依据为 S013. Group calculation, according to Euclid's theorem, divide all elements in I b into two groups S 1 and S 2 , and the basis for the grouping is
S014、质心迭代,计算每个群的质心|Sr|表示Sr中元素个数;S014, centroid iteration, calculate the centroid of each group |S r | represents the number of elements in S r ;
S015、根据公式决定迭代是否终止,ε是一个小于0的常量,若不满足,则c1=c′1,c2=c′2,执行步骤S013;否则执行步骤S016;S015. According to the formula Determine whether the iteration is terminated, ε is a constant less than 0, if not satisfied, then c 1 =c' 1 , c 2 =c' 2 , go to step S013; otherwise, go to step S016;
S016、导出AMBTC压缩码:S016. Export AMBTC compression code:
hk=max(c1,c2),h k =max(c 1 ,c 2 ),
lk=min(c1,c2),l k =min(c 1 ,c 2 ),
对每个图像区块重复上述步骤,即可得到整个原始图像的AMBTC压缩码其中,hk表示高阶量化水平值,lk表示低阶量化水平值,表示对应图像区块的位图。 Repeat the above steps for each image block to get the AMBTC compression code of the entire original image Among them, h k represents the high-order quantization level value, l k represents the low-order quantization level value, A bitmap representing the corresponding image block.
S02、根据所述AMBTC压缩码通过N变体AMBTC压缩处理后得到新的压缩码,并根据所述新的压缩码和位置信息通过hash函数生成相应的第二验证水印;S02, obtain a new compression code after N variant AMBTC compression processing according to the AMBTC compression code, and generate a corresponding second verification watermark by hash function according to the new compression code and position information;
步骤S02具体为:Step S02 is specifically:
S021、生成一4*4的第一参考表RT;S021, generate a 4*4 first reference table RT;
S022、根据第一参数N,将所述AMBTC压缩码的Bk中的前N比特位置腾出,得到新的压缩码并根据所述新的压缩码和位置信息通过hash函数生成相应的N比特的第二验证水印,其中B′k表示压缩处理后的位图。S022, according to the first parameter N, compress the AMBTC code The first N bits in B k are vacated to obtain a new compressed code and according to the new compression code and location information to generate a corresponding N-bit second verification watermark through a hash function, where B′ k represents the compressed bitmap.
S03、根据所述新的压缩码和所述第二验证水印生成水印图像。S03. Generate a watermark image according to the new compression code and the second verification watermark.
步骤S03具体为:Step S03 is specifically:
根据所述新的压缩码和所述第一验证水印通过位元替换的方式生成水印图像。A watermark image is generated by bit replacement according to the new compression code and the first verification watermark.
S1、获取待认证图像,并提取出相应的第一验证水印;S1, obtain the image to be authenticated, and extract the corresponding first verification watermark;
步骤S1还包括:Step S1 also includes:
根据第二参数N和第二参考表RT,从待认证图像中计算得到第三验证水印。According to the second parameter N and the second reference table RT, the third verification watermark is calculated from the image to be authenticated.
S2、根据所述第一验证水印和预设的规则对所述待认证图像进行图像认证。S2. Perform image authentication on the image to be authenticated according to the first authentication watermark and a preset rule.
步骤S2具体为:Step S2 is specifically:
根据所述第一验证水印、第三验证水印和预设的规则对所述待认证图像进行图像认证。Image authentication is performed on the image to be authenticated according to the first verification watermark, the third verification watermark and a preset rule.
所述的根据所述第一验证水印、第三验证水印和预设的规则对所述待认证图像进行图像认具体为:The image recognition of the to-be-authenticated image according to the first verification watermark, the third verification watermark and the preset rule is as follows:
判断所述第一验证水印与所述第三验证水印是否等同,若是,则判断所述待认证图像未被篡改,否则,判断所述待认证图像已被篡改。It is judged whether the first verification watermark is equal to the third verification watermark, and if so, it is judged that the image to be authenticated has not been tampered with; otherwise, it is judged that the image to be authenticated has been tampered with.
实施例二
本实施例和实施例一的区别在于,本实施例将结合具体的应用场景进一步说明本发明上述基于AMBTC的图像认证方法是如何实现的:The difference between this embodiment and
本发明主要包括3个方面:水印的生成、水印嵌入和图像验证与重建过程;The present invention mainly includes three aspects: watermark generation, watermark embedding and image verification and reconstruction process;
1、水印的生成1. Generation of watermark
当原始图像I通过新型变体AMBTC压缩处理后相应的AMBTC压缩码根据所述AMBTC压缩码通过N变体AMBTC压缩处理后得到新的压缩码,并根据所述新的压缩码和位置信息通过hash函数生成相应的第二验证水印;具体地,对于每一个区块将其对应(hk,lk,B′k)和当前区块位置信息k喂给hash函数以获取第二验证水印ack,其长度为N,且ack=fN(hk,lk,B′k,k).When the original image I is compressed by the new variant AMBTC, the corresponding AMBTC compression code According to the AMBTC compression code, a new compression code is obtained after N-variant AMBTC compression processing, and a corresponding second verification watermark is generated through a hash function according to the new compression code and location information; Specifically, for each block Feed its corresponding (h k , l k , B′ k ) and the current block position information k to the hash function to obtain the second verification watermark ac k , whose length is N, and ac k =f N (h k ,l k ,B′ k ,k).
2、水印的嵌入2. Embedding of watermarks
(1)新型变体AMBTC压缩处理(1) New variant AMBTC compression processing
对于每一个4*4的图像区块,将其16个像素按光栅扫描方式组成一维像素序列,并表示为Ib={b1,b2,…,b16}。接下来,新型AMBTC压缩处理可描述如下:For each 4*4 image block, its 16 pixels are formed into a one-dimensional pixel sequence in a raster scanning manner, and expressed as I b ={b 1 ,b 2 ,...,b 16 }. Next, the new AMBTC compression process can be described as follows:
1)质心初始化,从Ib中导出U,其中,并使得Ib中出现的每个像素值都含在U中且U中两两元素之间均不相同,若U的元素个数|U|≥2,则从其中选择两个元素构建一个初始质心集合C={c1,c2},并跳转至步骤2);若|U|=1,c1=c2,并跳转至步骤5);1) Centroid initialization, derive U from I b , where, And make each pixel value appearing in I b included in U and the two elements in U are different, if the number of elements in U |U|≥2 , select two elements from them to construct an initial The centroid set C={c 1 , c 2 }, and jump to step 2); if |U|=1, c 1 =c 2 , and jump to step 5);
2)分群计算,根据欧几里得定理,将Ib中所有元素分成两群S1和S2,分群的依据为其中,d(bv,cr)=(bv-cr)2.,1≤v≤16,1≤r≤2。2) Grouping calculation, according to Euclid's theorem, all elements in I b are divided into two groups S 1 and S 2 , and the basis for the grouping is Wherein, d(b v , cr ) =(b v -c r ) 2 . 1≤v≤16, 1≤r≤2.
3)质心迭代,计算每个群的质心|Sr|表示Sr中元素个数;3) Centroid iteration, calculating the centroid of each group |S r | represents the number of elements in S r ;
4)判断是否终止,根据公式决定迭代是否终止,ε是一个小于0的常量,若不满足,则c1=c′1,c2=c′2,跳转回步骤2);否则执行步骤5):4) Determine whether to terminate, according to the formula Determine whether the iteration is terminated, ε is a constant less than 0, if not satisfied, then c 1 =c' 1 , c 2 =c' 2 , jump back to step 2); otherwise, go to step 5):
5)导出AMBTC压缩码:5) Export AMBTC compression code:
hk=max(c1,c2),h k =max(c 1 ,c 2 ),
lk=min(c1,c2),l k =min(c 1 ,c 2 ),
对每个图像区块重复上述步骤,即可得到整个原始图像的AMBTC压缩码其中,hk表示高阶量化水平值,lk表示低阶量化水平值,表示对应图像区块的位图。 Repeat the above steps for each image block to get the AMBTC compression code of the entire original image Among them, h k represents the high-order quantization level value, l k represents the low-order quantization level value, A bitmap representing the corresponding image block.
(2)N变体AMBTC压缩处理(2) N variant AMBTC compression processing
当获得通过实施N变体AMBTC技术,从Bk腾出N比特的空间,用于隐藏第二验证水印,具体步骤如下:when obtained By implementing the N variant AMBTC technology, N bits of space are freed from B k to hide the second verification watermark. The specific steps are as follows:
1)生成一4*4的第一参考表RT,如图2(a)所示,其中(a)Bk;(b)参考表RT;(c)B′k(N=2);(d)B′k(N=8);1) Generate a 4*4 first reference table RT, as shown in FIG. 2(a), wherein (a) B k ; (b) reference table RT; (c) B′ k (N=2); ( d) B'k (N=8);
2)根据第一参数N,将所述AMBTC压缩码的Bk中的前N比特位置腾出;2) According to the first parameter N, compress the AMBTC code The first N bit positions in B k are vacated;
其中,前N比特位置的确定规则:根据RT图2(b)中六边形框内数字的大小从小到大确认。图2(c)是N为2时的B′k;图2(d)是N为8时的B′k,‘NA’表示腾出的位置。Among them, the determination rule for the position of the first N bits: confirm according to the size of the numbers in the hexagonal box in RT Figure 2(b) from small to large. Fig. 2(c) is B' k when N is 2; Fig. 2(d) is B' k when N is 8, 'NA' indicates the vacated position.
3)对每个区块压缩码实施上述过程,得到新的压缩码并根据所述新的压缩码和位置信息通过hash函数生成相应的N比特的第第二验证水印,其中B′k表示压缩处理后的位图。3) Implement the above process for each block compressed code to obtain a new compressed code And according to the new compression code and position information, a corresponding N-bit second verification watermark is generated through a hash function, where B′ k represents the compressed bitmap.
(3)当获得新的压缩码和相应的N比特的第二验证水印后,通过位元替换的形式,将N比特验证水印依次替换中B′k腾出的N个位置(顺序根据RT中蓝色六边形框内数字的大小从小到大确认),从而实现第二验证水印的嵌入,得到水印图像 (3) When a new compressed code is obtained After and the corresponding N-bit second verification watermark, the N-bit verification watermark is replaced in turn in the N positions vacated by B'k in the form of bit substitution (the order is based on the number in the blue hexagonal frame in RT). The size is confirmed from small to large), so as to realize the embedding of the second verification watermark, and obtain the watermark image
3、图像验证与重建过程3. Image verification and reconstruction process
1)图像验证1) Image verification
第一阶段:The first stage:
假设接收端接收到的AMBTC压缩码为对于每一对实施图像验证的步骤如下:Assume that the AMBTC compression code received by the receiver is for each pair The steps to implement image validation are as follows:
1)以同样的方式生成相应RT,(或发送方和接收方共享)。1) The corresponding RT is generated in the same way, (or shared by sender and receiver).
2)从中提取前N个比特位元(N个比特位元的提取顺序根据RT中六边形框内数字的大小从小到大确认),并串接成提取的验证水印,记为第一验证水印Eack。2) From Extract the first N bits (the extraction order of N bits is confirmed according to the size of the numbers in the hexagonal frame in RT from small to large), and concatenate them into the extracted verification watermark, which is marked as the first verification watermark Eac k .
3)根据所述第二参数N和第二参考表RT,将压缩成并根据水印产生的方法,并从待认证图像中计算得到第三验证水印,即Rack。3) According to the second parameter N and the second reference table RT, the compressed into And according to the method of watermark generation, the third verification watermark, namely Rack , is calculated from the image to be authenticated.
具体地,所述第二验证水印和第三验证水印生成过程相同,区别在于,若是水印图像被篡改,则第二验证水印和第三验证水印不相同,否则,计算得到的第三验证水印与水印生成过程中得到的第二验证水印相同,(所述第二参数N和第二参考表RT)与(第一参数N和第一参考表RT)的区别在于拥有者是不一样的,但是只有当他们数值是一样的才能够实现准确的验证,也就是N和RT是发送方和接受方双方共享的;Specifically, the generation process of the second verification watermark and the third verification watermark are the same, the difference is that if the watermark image is tampered with, the second verification watermark and the third verification watermark are not the same, otherwise, the calculated third verification watermark is the same as that of the third verification watermark. The second verification watermark obtained during the watermark generation process is the same, the difference between (the second parameter N and the second reference table RT) and (the first parameter N and the first reference table RT) is that the owner is different, but Only when their values are the same can accurate verification be achieved, that is, N and RT are shared by both the sender and the receiver;
4)若图像没有被篡改,则Eack应与Rack等同。因此通过比较Eack(第一水印)和Rack(第三水印),若相等,则该区块认为没有被篡改;反之,则认为该区块被篡改。4) If the image has not been tampered with, Eack should be equivalent to Rack . Therefore, by comparing Eack (first watermark) and Rack (third watermark), if they are equal, the block is considered to have not been tampered with; otherwise, it is considered that the block has been tampered with.
对每个区块都实施上述过程之后,可得到整个图像的篡改检测结果,记为TM。After the above process is performed for each block, the tampering detection result of the entire image can be obtained, which is recorded as TM.
第二阶段:second stage:
为了解决第一阶段出现的误判情况,在TM上实施第二阶段篡改验证。基本原则是:以某一区块为中心,在其周围3*3的小区域内。将该区域划分为4个部分,成为左,上,右,下,对应于图3(a)-(d)灰色黑色区域。每一部分是一个2*3或3*2的矩形区域。黑色表示在第一阶段鉴定为被篡改区块,灰白色表示在第一阶段鉴定为无篡改区块。‘*’表示当前需要被鉴定的区块。若当前区块的上述4个部分中(左,上,右,下),存在某一区域中超过4/6的区块鉴定为被篡改区块,则进一步判断该区块为篡改区块,如图3(e)-(f)所示。In order to solve the misjudgment situation in the first stage, the second stage tamper verification is implemented on the TM. The basic principle is: take a block as the center, in a small area of 3*3 around it. The area is divided into 4 parts, which are left, upper, right, and lower, corresponding to the gray-black areas in Fig. 3(a)-(d). Each part is a 2*3 or 3*2 rectangular area. Black indicates a tampered block identified in the first stage, and gray indicates a non-tampered block identified in the first stage. '*' indicates the block that currently needs to be authenticated. If more than 4/6 of the blocks in the above-mentioned 4 parts of the current block (left, top, right, bottom) are identified as tampered blocks, it is further judged that the block is a tampered block, As shown in Figure 3(e)-(f).
实施上述两阶段的图像验证过程,即可获得最终的验证结果TM。By implementing the above two-stage image verification process, the final verification result TM can be obtained.
(2)图像重建(2) Image reconstruction
如需要重建压缩图像,可根据如下步骤重建:If you need to reconstruct the compressed image, you can reconstruct it according to the following steps:
对于某一待重建像素,以其3*3范围内的已重建像素(根据压缩码可重建部分像素)为参考,利用自适应权重的策略,重建自身像素。为了方便,假设待重建像素为b’x,其3*3范围内的已重建像素为X={b’1,b’2,…,b’N}。则当前b’x的像素值可预估为:For a certain pixel to be reconstructed, it uses the reconstructed pixels in the range of 3*3 (part of the pixels can be reconstructed according to the compression code) as a reference, and uses the strategy of adaptive weight to reconstruct its own pixels. For convenience, it is assumed that the pixel to be reconstructed is b' x , and the reconstructed pixels within the range of 3*3 are X={b' 1 , b' 2 , . . . , b' N }. Then the pixel value of the current b' x can be estimated as:
其中, 为分配到xt的方差。in, is the variance assigned to xt .
图4给出了相关示例。A related example is given in Figure 4.
针对缺点1,事实上图像区域具有局部相似性,因此提出了进一步压缩位图位元已腾出空间隐藏验证水印的策略。从而可实现N比特的验证能力,N=0-10。首先,相对于洪维恩的方法,将验证精度提高了2比特,并且提出了一个新型的误判解决方法,确保了高精度和准确的图像验证结果。同时为了确保重建图像的品质,我们提出了两种方法优化:第一是提出了新型的AMBTC压缩策略;第二提出了自适应权重策略预估待测像素;从而确保的图像品质。表1给出了本发明和洪维恩等人方法的图像品质实验结果对比。For
表1.本发明与洪维恩等人方法的图像品质对比(N=2,4,6,8,10)Table 1. Image quality comparison between the present invention and the method of Hong Weien et al. (N=2, 4, 6, 8, 10)
‘-’:表示该方法未提供或无条件实现。'-': Indicates that the method is not provided or unconditionally implemented.
针对缺点2,无法抵挡拼贴攻击。洪维恩等人的方法中,每个图像区块,通过自身压缩码(部分)计算哈希结果(验证水印),然后以LSB替换的方式实施自嵌入。因此,该方法无法抵挡拼贴攻击。而本发明进一步将区块的位置信息喂入哈希函数,确保能够抵挡拼贴攻击。同时,在验证阶段,提出了一种新型的误判解决方案,进一步提升了图像验证效果。For
其中:图5(a)为篡改后的压缩图像,共被篡改了5个区域(5种类型攻击),具体篡改区域如图5(a)所示。Among them: Figure 5(a) is the tampered compressed image, and 5 areas (5 types of attacks) have been tampered with, and the specific tampered area is shown in Figure 5(a).
A:篡改该区域的量化水平的值;A: tamper with the value of the quantization level of the area;
B:篡改该区域的位图的原始比特;B: tamper with the original bits of the bitmap of the area;
C:篡改该区域的位图的验证水印比特;C: tamper with the verification watermark bits of the bitmap of this area;
D:拼贴攻击;D: collage attack;
E:复制粘贴攻击(一朵花);E: copy-paste attack (a flower);
黑色部分表示:被篡改区域或被检测为篡改区域,白色部分表示未背篡改区域或被检测为未篡改区域。The black part represents the tampered area or the detected area, and the white part represents the untampered area or detected as the untampered area.
图5.图像验证结果示意图(N=10):(a)被篡改的LeNa图像;Figure 5. Schematic diagram of image verification results (N=10): (a) tampered LeNa image;
本发明的验证结果:(b)第一阶段(TDR=99.87%);(f)第一阶段(TDR=99.97%);(d)未被正确检测的区块;(e)原始篡改区域;Verification results of the present invention: (b) first stage (TDR=99.87%); (f) first stage (TDR=99.97%); (d) blocks not correctly detected; (e) original tampered area;
洪维恩方法的验证结果:(f)第一阶段(TDR=87.35%);(g)第一阶段(TDR=87.61%);(h)未被正确检测的区块。Verification results of Hong Weien's method: (f) first stage (TDR=87.35%); (g) first stage (TDR=87.61%); (h) blocks that were not detected correctly.
以上所述仅为本发明的实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等同变换,或直接或间接运用在相关的技术领域,均同理包括在本发明的专利保护范围内。The above descriptions are only examples of the present invention, and are not intended to limit the scope of the patent of the present invention. Any equivalent transformations made by using the contents of the description and drawings of the present invention, or directly or indirectly applied in related technical fields, are similarly included in the within the scope of patent protection of the present invention.
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911316925.6A CN111127290B (en) | 2019-12-19 | 2019-12-19 | An Image Authentication Method Based on AMBTC |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911316925.6A CN111127290B (en) | 2019-12-19 | 2019-12-19 | An Image Authentication Method Based on AMBTC |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111127290A CN111127290A (en) | 2020-05-08 |
CN111127290B true CN111127290B (en) | 2022-05-03 |
Family
ID=70500796
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911316925.6A Active CN111127290B (en) | 2019-12-19 | 2019-12-19 | An Image Authentication Method Based on AMBTC |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111127290B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103426141A (en) * | 2013-08-09 | 2013-12-04 | 深圳大学 | Method and system for authenticating image contents |
CN105812816A (en) * | 2016-03-17 | 2016-07-27 | 安徽大学 | Compression encryption authentication joint coding method |
CN108111855A (en) * | 2017-12-21 | 2018-06-01 | 北京工业大学 | A kind of adaptive code flat blocks based on quaternary tree block coding method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120014447A1 (en) * | 2010-07-16 | 2012-01-19 | Sharp Laboratories Of America, Inc. | System for low resolution power reduction with high resolution deblocking |
-
2019
- 2019-12-19 CN CN201911316925.6A patent/CN111127290B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103426141A (en) * | 2013-08-09 | 2013-12-04 | 深圳大学 | Method and system for authenticating image contents |
CN105812816A (en) * | 2016-03-17 | 2016-07-27 | 安徽大学 | Compression encryption authentication joint coding method |
CN108111855A (en) * | 2017-12-21 | 2018-06-01 | 北京工业大学 | A kind of adaptive code flat blocks based on quaternary tree block coding method |
Non-Patent Citations (1)
Title |
---|
"TSIA_ A Novel Image Authentication Scheme fir AMBTC-Based Compressed Images Using Turtle Shell Based Reference Matrix";Chih-Cheng Chen, Chin-Chen Chang, Chia-Chen Lin, Guo-Dong Su;《IEEE Access》;20191025;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111127290A (en) | 2020-05-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105741224B (en) | Reversible Watermarking Algorithm Based on PVO and Adaptive Block Partitioning | |
CN101833746B (en) | Embedding method and extracting method of reversible watermark in digital image | |
Thabit et al. | Medical image authentication using SLT and IWT schemes | |
CN108416724B (en) | A Reversible Information Hiding Method Based on Multiple Predictors | |
CN101419702B (en) | Semi-fragile watermarking method for color image tamper localization and recovery | |
CN101163188B (en) | Image processing apparatus, image reading apparatus, image forming apparatus, image processing method | |
CN104778651A (en) | Digital image authentication method based on super-pixels | |
JP5974589B2 (en) | Image processing apparatus and program | |
CN106530203B (en) | A kind of adaptive steganography method of jpeg image based on Texture complication | |
TW201110701A (en) | Image processing method combining compression and watermark techniques | |
US11915336B2 (en) | Method and device for watermark-based image integrity verification | |
CN109741233B (en) | Reversible watermark embedding and extracting method | |
CN113538201B (en) | Ceramic watermarking model training method, device and embedding method based on bottom changing mechanism | |
CN110796582A (en) | A reversible clear watermarking method and device based on vector graphics compression | |
CN118864218B (en) | Depth separable convolution multimedia watermark embedding and extracting method | |
CN111127290B (en) | An Image Authentication Method Based on AMBTC | |
CN108898542A (en) | A kind of insertion and extracting method of reversible water mark | |
CN107346528A (en) | A kind of distorted image detection method based on the reversible fragile watermark of digraph | |
CN107241597A (en) | A kind of reversible information hidden method of combination quaternary tree adaptive coding | |
CN111583086B (en) | AMBTC-based self-adaptive digital image watermark and restoration method | |
CN110148079B (en) | A method of digital image tampering detection, localization and self-recovery | |
CN115690014A (en) | Medical image tampering detection and self-recovery method based on texture degree cross embedding | |
Zhou et al. | An unsolvable pixel reduced authentication method for color images with grayscale invariance | |
Chalamala et al. | Local binary patterns for digital image watermarking | |
CN104486524B (en) | The method whether detection image undergoes compression quality identical JPEG compression twice |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address |
Address after: No.1 campus new village, Rongcheng Town, Fuqing City, Fuzhou City, Fujian Province Patentee after: Fujian Normal University of Technology Country or region after: China Address before: No.1 campus new village, Rongcheng Town, Fuqing City, Fuzhou City, Fujian Province Patentee before: FUQING BRANCH OF FUJIAN NORMAL University Country or region before: China |
|
CP03 | Change of name, title or address |