CN113177214A - Image publishing and auditing method, related device and computer program product - Google Patents

Image publishing and auditing method, related device and computer program product Download PDF

Info

Publication number
CN113177214A
CN113177214A CN202110473054.XA CN202110473054A CN113177214A CN 113177214 A CN113177214 A CN 113177214A CN 202110473054 A CN202110473054 A CN 202110473054A CN 113177214 A CN113177214 A CN 113177214A
Authority
CN
China
Prior art keywords
image
source information
processed
issued
check code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110473054.XA
Other languages
Chinese (zh)
Inventor
张欢
熊俊峰
王洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202110473054.XA priority Critical patent/CN113177214A/en
Publication of CN113177214A publication Critical patent/CN113177214A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp

Abstract

The disclosure provides image publishing and auditing methods and devices, electronic equipment, a computer readable storage medium and a computer program product, and relates to the technical field of data security. One embodiment of the method comprises: acquiring an image to be issued containing sensitive image content; embedding the encrypted source information of the image to be issued into the image to be issued through steganography to obtain a processed image; and generating a check code for verifying the integrity of the processed image, and taking the processed image added with the check code as an image to be checked. The method and the device can sequentially pass through the integrity checking mechanism and the source information embedding mechanism of steganography, tamper detection is carried out on the image transmission process and the source information embedding process, and more accurate and more comprehensive detection can be carried out on whether the image containing sensitive content is tampered.

Description

Image publishing and auditing method, related device and computer program product
Technical Field
The present disclosure relates to the field of image processing technologies, and in particular, to the field of steganography detection and data security technologies, and in particular, to an image publishing and auditing method, and a corresponding apparatus, an electronic device, a computer-readable storage medium, and a computer program product.
Background
With the rapid development of human face tampering and counterfeiting technologies, the authenticity and credibility of pictures and videos of human faces are challenged.
Therefore, it is important to research on how to verify whether image information including sensitive information such as a human face is tampered.
Disclosure of Invention
The embodiment of the disclosure provides an image publishing method, an image auditing method, an image publishing device, an image auditing device, electronic equipment, a computer-readable storage medium and a computer program product.
In a first aspect, an embodiment of the present disclosure provides an image publishing method, including: acquiring an image to be issued containing sensitive image content; embedding the encrypted source information of the image to be issued into the image to be issued through steganography to obtain a processed image; and generating a check code for verifying the integrity of the processed image, and taking the processed image added with the check code as an image to be checked.
In a second aspect, an embodiment of the present disclosure provides an image auditing method, including: receiving an image to be checked, and obtaining a check code and a processed image according to the image to be checked; verifying the data integrity of the processed image based on the check code and the processed image; responding to the processed image and passing data integrity verification, and extracting encrypted source information from the image to be processed; and in response to the encrypted source information being decrypted into readable plaintext by a preset decryption mode, issuing the processed image.
In a third aspect, an embodiment of the present disclosure provides an image distribution apparatus, including: the image to be issued acquiring unit is configured to acquire an image to be issued containing sensitive image content; the source information steganography unit is configured to embed the encrypted source information of the image to be issued into the image to be issued through steganography to obtain a processed image; and the integrity check code adding unit is configured to generate a check code for verifying the integrity of the processed image, and take the processed image with the check code added as an image to be checked.
In a fourth aspect, an embodiment of the present disclosure provides an image auditing apparatus, including: the image receiving and extracting unit to be audited is configured to receive the image to be audited and obtain a check code and a processed image according to the image to be audited; a data integrity verification unit configured to verify data integrity of the processed image based on the check code and the processed image; a source information extraction unit configured to extract encrypted source information from the image to be processed in response to the processed image passing data integrity verification; and the audit-passed image issuing unit is configured to issue the processed image in response to the encrypted source information being decrypted into readable plaintext by a preset decryption mode.
In a fifth aspect, an embodiment of the present disclosure provides an electronic device, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to cause the at least one processor to perform the image publication method as described in any one of the implementations of the first aspect or the image review method as described in any one of the implementations of the second aspect.
In a sixth aspect, the disclosed embodiments provide a non-transitory computer-readable storage medium storing computer instructions for enabling a computer to implement the image publishing method as described in any implementation manner of the first aspect or the image auditing method as described in any implementation manner of the second aspect.
In a fifth aspect, the present disclosure provides a computer program product comprising a computer program, which when executed by a processor is capable of implementing the image publishing method as described in any implementation manner of the first aspect or the image auditing method as described in any implementation manner of the second aspect.
According to the image publishing and auditing method provided by the embodiment of the disclosure, firstly, encrypted source information is written into an original image through steganography, so that the encrypted source information is hidden in the processed image, and on the basis, a check code is obtained through addition and calculation of an integrity check technology, so that whether the received image is tampered in a transmission process can be firstly determined based on the check code in an auditing process, if the check code is correct and meaningful source information can be obtained through a preset decryption mode, the received image can be considered to be in line with requirements, otherwise, the received image is considered to belong to the tampered image.
By applying the technical means provided by the technical scheme, the source information embedding mechanism of the integrity checking mechanism and the steganography can be sequentially adopted to carry out tampering detection on the image transmission process and the source information embedding process, and more accurate and more comprehensive detection can be carried out on whether the image containing sensitive content is tampered.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present disclosure, nor do they limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
Other features, objects and advantages of the disclosure will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is an exemplary system architecture to which the present disclosure may be applied;
fig. 2 is a flowchart of an image publishing method according to an embodiment of the present disclosure;
fig. 3 is a flowchart of another image publishing method provided by the embodiment of the present disclosure;
fig. 4 is a flowchart of an image auditing method provided by an embodiment of the present disclosure;
FIG. 5 is a flowchart of another image review method provided by an embodiment of the present disclosure;
fig. 6 is a flowchart of an image processing method in an application scenario according to an embodiment of the present disclosure;
fig. 7 is a block diagram of an image distribution apparatus according to an embodiment of the present disclosure;
fig. 8 is a block diagram of an image auditing apparatus according to an embodiment of the present disclosure;
fig. 9 is a schematic structural diagram of an electronic device suitable for executing an image publishing or auditing method according to an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below with reference to the accompanying drawings, in which various details of the embodiments of the disclosure are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness. It should be noted that, in the present disclosure, the embodiments and features of the embodiments may be combined with each other without conflict.
In the technical scheme of the disclosure, the acquisition, storage, application and the like of the personal information of the related user all accord with the regulations of related laws and regulations, necessary security measures are taken, and the customs of the public order is not violated.
Fig. 1 illustrates an exemplary system architecture 100 to which embodiments of the image publication, review methods, apparatuses, electronic devices, and computer-readable storage media of the present disclosure may be applied.
As shown in fig. 1, the system architecture 100 may include a publishing end 101, 102, 103, a network 104, and a reviewing end 105. The network 104 is used to provide a medium for communication links between the distribution ends 101, 102, 103 and the auditing end 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The users may use the publishing terminals 101, 102, 103 to interact with the auditing terminal 105 via the network 104 to receive or send messages or the like. Various applications for realizing information communication between the publishing terminals 101, 102, 103 and the auditing terminal 105, such as an image publishing application, an image auditing application to be published, an instant messaging application, etc., may be installed on the publishing terminals 101, 102, 103 and the auditing terminal 105.
The issuing ends 101, 102, 103 and the auditing end 105 can be hardware or software. When the distribution terminals 101, 102, 103 are hardware, they may be various electronic devices with display screens, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like; when the distribution end 101, 102, 103 is software, it can be installed in the electronic devices listed above, and it can be implemented as multiple software or software modules, or as a single software or software module, and is not limited in this respect. When the auditing end 105 is hardware, it may be implemented as a distributed server cluster composed of multiple servers, or as a single server; when the server is software, the server may be implemented as a plurality of software or software modules, or may be implemented as a single software or software module, which is not limited herein.
The publishing terminals 101, 102, 103 and the auditing terminal 105 can provide various services through various built-in applications, for example, image publishing applications installed in the publishing terminals 101, 102, 103 and image auditing applications to be published installed in the auditing terminal 105, and the two types of applications can achieve the following effects in matching operation according to the sequence of publishing first and then auditing:
the publishing terminals 101, 102 and 103 acquire images to be published which contain sensitive image contents; embedding the encrypted source information of the image to be issued into the image to be issued through steganography to obtain a processed image; generating a check code for verifying the integrity of the processed image, and taking the processed image with the check code as an image to be checked; and sending the image to be audited to the auditing terminal 105 through the network 104 for auditing before release.
The auditing terminal 105 receives the transmitted image to be audited through the network 104, and obtains a check code and a processed image according to the image to be audited; verifying the data integrity of the processed image based on the check code and the processed image; responding to the processed image and passing data integrity verification, and extracting encrypted source information from the image to be processed; and in response to the encrypted source information being decrypted into readable plaintext by a preset decryption mode, issuing the processed image.
It should be understood that the number of publishing, networking and auditing endpoints in fig. 1 is merely illustrative. There may be any number of issuing ends, networks and auditing ends, as desired for an implementation.
Referring to fig. 2, fig. 2 is a flowchart of an image publishing method according to an embodiment of the disclosure, where the process 200 includes the following steps:
step 201: acquiring an image to be issued containing sensitive image content;
this step is intended to obtain an image to be distributed containing sensitive image content by an executing agent of the image distribution method (for example, the distribution terminals 101, 102, 103 shown in fig. 1).
Wherein the sensitive image content comprises: at least one item of face image, license plate number information and text information in a preset arrangement format. The face image belongs to the personal privacy of the user, the license plate number belongs to the important identification of the property of the user, and some text information containing sensitive content is generally arranged in a specific format, such as a table format, a bilateral symmetry mode, a column division mode and the like. In addition, the image to be published may be a single picture or a scattered picture set obtained directly, or may be a continuous video picture captured or extracted from a video containing sensitive image content.
It should be noted that the image to be distributed containing the sensitive image content may be obtained by the execution main body directly from a local storage device, or may be obtained from a non-local storage device (for example, terminal devices 101, 102, 103 shown in fig. 1). The local storage device may be a data storage module arranged in the execution main body, for example, a server hard disk, in which case, the image to be published containing the sensitive image content may be quickly read locally; the non-local storage device may also be any other electronic device configured to store data, such as some user terminals, in which case the executing entity may obtain the required image to be distributed containing the sensitive image content by sending a obtaining command to the electronic device.
Step 202: embedding the encrypted source information of the image to be issued into the image to be issued through steganography to obtain a processed image;
on the basis of step 201, this step is intended to embed, by the execution subject, the encrypted source information of the image to be distributed into the image to be distributed by steganography.
Among them, steganography is a skill and science about information hiding, which means that anyone other than the intended recipient is not made aware of the delivery event of information or the content of information. When the carrier is an image, the information to be hidden is embedded into the image through steganography, and the impression of the image directly, namely the content of the image, is not influenced, so that the steganography effect is realized.
Steganography is various, such as the common LSB (Least Significant Bit) steganography for modifying the Least Significant bits of the picture pixels, and DCT (Discrete Cosine Transform) steganography by modifying DCT coefficients, and so on.
The principle of LSB steganography is briefly explained as follows: one hides the secret information in the image and replaces the message bits with the least significant bits of each byte in the image. But the image has not changed much (most image standards specify a much higher level of color than the human eye can perceive), the secret message can be stripped out at the receiving end. Such as a photograph, the color of each pixel is described in 24 bits in the computer. If the least significant (i.e., least significant) of the 24 bits of each pixel is taken out to store another document, the human eye does not tell what difference the photograph hiding the document is from the original photograph. In this way 64KB messages can be stored in grey scale pictures with a size of 1024 x 1024 bytes.
The source information is related parameters of the execution main body used for publishing the image to be published, is used for representing who publishes the image to be published, and can include core source information such as the equipment number of the execution main body and the identity information of a login user, and can also include information such as time to be published, a publishing position, a working group and domain information according to actual requirements.
After the source information is acquired, the image to be issued is actually embedded into the ciphertext obtained by encrypting the source information through steganography, and the purpose of encrypting the source information is to enable only a decryption end with a decryption algorithm to acquire the source information of the plaintext, so that the source information serving as sensitive information is prevented from being leaked as much as possible. Specifically, the encryption algorithm and the decryption algorithm may adopt a unique key calculated by a symmetric encryption algorithm, or may adopt a public-private key pair calculated by an asymmetric encryption algorithm (that is, public key encryption is adopted, and a decryption end uses a private key for decryption).
Furthermore, when the encrypted source information is embedded into the image to be released through steganography, the encrypted source information can disperse the complete source information into a plurality of parts to be respectively embedded into different pixel points of the image to be released, the pixel points can be selected according to actual requirements, for example, a continuous pixel point at a specific position can be selected, a discontinuous pixel point at a specific position can be selected, discontinuous pixel points at a plurality of specific positions can be selected, and the possibility that a specific steganography mechanism is cracked by a third party is reduced as much as possible
Step 203: and generating a check code for verifying the integrity of the processed image, and taking the processed image added with the check code as an image to be checked.
On the basis of step 202, in this step, the integrity check code of the processed image is obtained by the execution subject calculation, and the image to be audited is obtained by adding the integrity check code.
Specifically, the integrity check code needs to be generated by means of an integrity check technology, and whether the data is consistent before and after transmission can be verified by the integrity check technology, that is, the data is kept complete. For example, the error detection may be performed by Cyclic Redundancy Check (CRC), which is a channel coding technique that generates short fixed parity Check codes based on data such as network packets or computer files, using the principles of division and remainder to detect errors; the characteristic value of the data (e.g., MD5 value) can also be calculated by a hash algorithm as an integrity check code. In addition, other parameters capable of uniquely corresponding to the data content can also be used as the integrity check code.
The image publishing method provided by the embodiment of the disclosure can sequentially pass through the integrity checking mechanism and the source information embedding mechanism of steganography, tamper detection can be performed on the image transmission process and the source information embedding process, and more accurate and more comprehensive detection can be performed on whether the image containing sensitive content is tampered.
On the basis of the embodiment shown in fig. 2, the present embodiment further provides a flowchart of another image publishing method through fig. 3, where the flowchart 300 includes the following steps:
step 301: acquiring a face image to be published;
the present embodiment takes an image containing sensitive image content of a human face as an example.
Step 302: embedding the encrypted source information of the face image to be issued into the face through steganography to obtain a processed face image;
for the face image, if the face image is tampered, most tampered objects are concentrated on the face, so that the encrypted source information is embedded into the face through steganography, and whether the face image is tampered or not can be identified more sensitively.
Step 303: generating a CRC (cyclic redundancy check) code of the processed face image by a CRC technology;
the embodiment specifically adopts an integrity check mechanism with better image adaptability, namely CRC, to take the generated CRC check code as the integrity check code.
Step 304: and taking the processed face image with the attached CRC code as a face image to be checked.
On the basis of the embodiment shown in fig. 2, in this embodiment, specifically for a face image to be distributed, the encrypted source information is preferably embedded into the face through step 302 to improve the tamper detection sensitivity, and the CRC technology better matched with the data representation form of the image is preferably adopted through step 303 to implement integrity check.
It should be understood that there is no causal or dependency relationship between the step 302 for defining the embedded location of the source information and the step 303 for defining the specific adopted calculation manner of the integrity check code, and that separate embodiments may be formed by combining the embodiments shown in fig. 2, which only exist as preferred embodiments including two preferred solutions.
Fig. 2 and fig. 3 show a scheme how a publishing terminal publishes an image to be published, and correspondingly, referring to fig. 4, fig. 4 is a flowchart of an image auditing method provided by an embodiment of the present disclosure, where the flowchart 400 includes the following steps:
step 401: receiving an image to be checked, and obtaining a check code and a processed image according to the image to be checked;
the step is intended to receive an image to be checked by an executive body (for example, the checking terminal 105 shown in fig. 1) of the image publishing method, and obtain a check code and a processed image according to the image to be checked.
When the check code is added to the image to be checked as attribute information, the check code can be directly obtained in a mode of extracting the attribute information, and the image to be checked is the processed image in the mode; when the check code is added to the processed image as a part of the image content, the check code needs to be extracted from a specific position in the image to be checked, and the image to be checked after the check code is removed is the processed image.
Step 402: verifying the data integrity of the processed image based on the check code and the processed image;
the principle of the data integrity verification mechanism provided in this step is as follows: and recalculating the extracted actual check code of the processed image according to an algorithm which is consistent with the calculated check code, comparing the recalculated actual check code with the extracted theoretical check code, and if the recalculated actual check code is consistent with the extracted theoretical check code, determining that the processed image is not tampered in the transmission process, otherwise, determining that the processed image is tampered.
Step 403: responding to the processed image and passing data integrity verification, and extracting encrypted source information from the image to be processed;
this step is based on the processed image passing the data integrity verification, and aims to further extract the previously embedded encrypted source information from the to-be-processed image by the execution main body.
Step 404: and in response to the encrypted source information being decrypted into readable plaintext by a preset decryption mode, issuing the processed image.
The step is established on the basis that the encrypted source information is decrypted into the readable plaintext by the preset decryption mode, the encrypted source information can be decrypted by the preset decryption mode, the fact that the issuing end adopts the previously agreed encryption algorithm to encrypt is indicated, the decryption result is the readable plaintext, and the fact that the encrypted object of the issuing end is the previously agreed meaningful information is indicated.
On the basis of the embodiment shown in fig. 4, this embodiment further provides a flowchart of another image review method through fig. 5, where the flowchart 500 includes the following steps:
step 501: receiving an image to be checked, and obtaining a check code and a processed image according to the image to be checked;
step 502: verifying the data integrity of the processed image based on the check code and the processed image;
step 503: judging whether the processed image passes data integrity verification, if so, executing step 504, otherwise, executing step 508;
step 504: extracting encrypted source information from the image to be processed;
in this step, on the basis that the determination result of step 503 is that the processed image passes the data integrity verification, the execution subject extracts the encrypted source information from the image to be processed.
Step 505: judging whether the source information can be decrypted into readable plaintext, if so, executing step 506, otherwise, executing step 507;
step 506: issuing the processed image;
this step is based on the fact that the source information can be decrypted into readable plaintext as a result of the determination in step 505, which means that not only the processed image is not tampered during transmission, but also the source information is embedded as required, so that the execution body issues the image as it is considered to satisfy the image issuance standard.
Step 507: returning notification information that the processed image adopts an illegal source information encryption mode;
in this step, based on the determination result in step 505 that the source information cannot be decrypted by the predetermined decryption method (for example, the decryption result is a messy code) or that the content decrypted by the predetermined decryption method is a plaintext with a non-predetermined format, the execution main body returns notification information that the processed image adopts an illegal source information encryption method. I.e. the release criterion is not fulfilled at this point.
Step 508: and returning the information of the falsified processed image in the transmission process.
This step is based on the determination result of step 503 being that the processed image fails the data integrity verification, and the execution main body returns the notification information that the processed image is tampered in the transmission process.
Compared with the embodiment shown in fig. 4, the embodiment specifically provides two determinations performed in sequence, and complements a specific processing manner for other branches of the determination performed at each level, so that the completeness of the scheme is improved, and the consideration is more comprehensive. It should be understood that the two branch schemes provided by step 507 and step 508 in the present embodiment do not necessarily need to occur simultaneously in the same embodiment, and will be taken as an example here.
For further understanding, the present disclosure also provides a specific implementation scheme in conjunction with a specific application scenario, please refer to a timing diagram as shown in fig. 6:
actions performed by the publisher:
1-determining a face image to be released;
and the issuing end determines the corresponding face image as the face image to be issued according to the selected information of the user on a certain piece of face information in the photo album library.
2, acquiring source information;
and the publishing terminal collects the shooting user, the equipment code and the shooting time corresponding to the image to be published and packages the shooting user, the equipment code and the shooting time into source information.
3, embedding the source information into the face image to be issued through steganography after encryption;
the issuing end encrypts the source information by adopting a public key of an asymmetric encryption algorithm, and specifically embeds the issued face image by LSB steganography.
4-calculating a CRC check code;
and the issuing end adopts a CRC mechanism to calculate to obtain the face image embedded with the source information, and a CRC check code is obtained.
5-the face image to be checked with the attached CRC check code;
and the issuing end sends the face image to be checked with the CRC code to the checking end through the network.
Actions performed by the auditor:
6-verifying data integrity based on the CRC check code;
and the auditing end verifies the data integrity based on the CRC check mechanism and the extracted CRC check code.
7.1-the transmission process was tampered with;
and when the auditing end determines that the image is tampered according to the verification result, the auditing end returns notification information of the tampering in the transmission process to the issuing end.
7.2-extract the source information and try to decrypt it into plaintext;
and when the verifying end determines that the image is not tampered according to the verification result, the encrypted source information is extracted from the image according to a pre-agreed source information embedding mode, and the encrypted source information is tried to be decrypted into plaintext information according to a pre-agreed encryption and decryption algorithm.
8.1-adopting an illegal steganography mode;
and when the auditing end determines that the decryption result is meaningless according to the decryption condition, the auditing end returns the notification information adopting an illegal steganography mode to the issuing end.
8.2-publishing the face image embedded with the source information.
And when the auditing end determines that the decryption result is in compliance according to the decryption condition, the auditing end sends the face image embedded with the source information to the presenting end. The presenting end may be an image presenting platform, or may be a display device such as a display screen.
With further reference to fig. 7 and 8, as implementations of the methods shown in the above-mentioned figures, the present disclosure further provides an embodiment of an image distribution apparatus and an embodiment of an image auditing apparatus, respectively, where the embodiment of the image distribution apparatus corresponds to the embodiment of the image distribution method shown in fig. 2, and the embodiment of the image auditing apparatus corresponds to the embodiment of the image auditing method shown in fig. 4, and the above-mentioned apparatuses may be applied to various electronic devices.
As shown in fig. 7, the image distribution apparatus 700 of the present embodiment may include: an image to be issued acquiring unit 701, a source information steganography unit 702 and an integrity check code attaching unit 703. The image to be published obtaining unit 701 is configured to obtain an image to be published including sensitive image content; a source information steganography unit 702 configured to embed the encrypted source information of the image to be published into the image to be published by steganography, so as to obtain a processed image; an integrity check code adding unit 703 configured to generate a check code for verifying the integrity of the processed image, and use the processed image to which the check code is added as an image to be checked.
In the present embodiment, in the image distribution apparatus 700: the detailed processing and the technical effects of the to-be-issued image obtaining unit 701, the source information steganography unit 702 and the integrity check code appending unit 703 can refer to the related descriptions of step 201 and step 203 in the corresponding embodiment of fig. 2, which are not described herein again.
In some optional implementations of this embodiment, the source information steganography unit 702 may be further configured to:
and embedding the encrypted source information of the image to be issued into the image to be issued through Least Significant Bit (LSB) steganography.
In some optional implementations of this embodiment, the sensitive image content includes: at least one item of face image, license plate number information and text information in a preset arrangement format.
In some optional implementations of this embodiment, the source information steganography unit 702 may be further configured to:
and responding to the fact that the image to be released contains the face image, and embedding the encrypted source information of the image to be released into the face of the face image through steganography.
In some optional implementations of this embodiment, the integrity check code appending unit 703 may be further configured to:
and generating a CRC check code of the image to be processed by a Cyclic Redundancy Check (CRC) technology.
As shown in fig. 8, the image verification apparatus 800 of the present embodiment may include: an image to be audited receiving and extracting unit 801, a data integrity checking unit 802, a source information extracting unit 803, and an audited passing image issuing unit 804. The image receiving and extracting unit 801 is configured to receive an image to be audited, and obtain a check code and a processed image according to the image to be audited; a data integrity verification unit 802 configured to verify data integrity of the processed image based on the check code and the processed image; a source information extraction unit 803 configured to extract encrypted source information from the image to be processed in response to the processed image passing the data integrity verification; the audit-passed image issuing unit 804 is configured to issue the processed image in response to the encrypted source information being decrypted into readable plaintext by a preset decryption manner.
In the present embodiment, in the image verification apparatus 800: the detailed processing and the technical effects of the to-be-audited image receiving and extracting unit 801, the data integrity checking unit 802, the source information extracting unit 803, and the audit passed image issuing unit 804 can refer to the related description of step 401 and step 404 in the corresponding embodiment of fig. 2, which is not described herein again.
In some optional implementations of the present embodiment, the image auditing apparatus 800 may further include:
and a first notification information returning unit configured to return notification information that the processed image is tampered during transmission in response to the processed image failing to pass the data integrity verification.
In some optional implementations of the present embodiment, the image auditing apparatus 800 may further include:
and the second notification information returning unit is configured to respond to the encrypted source information being preset in a decryption mode of a scrambled code or a plaintext in a non-preset format, and return notification information that the processed image adopts an illegal source information encryption mode.
The embodiment exists as an embodiment of an apparatus corresponding to the embodiment of the method, and can perform tampering detection on an image transmission process and a source information embedding process sequentially through an integrity check mechanism and a source information embedding mechanism of steganography, and can perform more accurate and more comprehensive detection on whether an image containing sensitive content is tampered.
According to an embodiment of the present disclosure, the present disclosure also provides an electronic device including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to cause the at least one processor to perform the method of image publication and/or auditing of any of the content distribution networks described above when executed by the at least one processor.
According to an embodiment of the present disclosure, the present disclosure further provides a readable storage medium storing computer instructions for enabling a computer to implement any one of the image publishing and/or auditing methods of a content distribution network described above when executed.
The disclosed embodiments provide a computer program product which, when executed by a processor, is capable of implementing any of the above-described image publication and/or auditing methods of a content distribution network.
FIG. 9 illustrates a schematic block diagram of an example electronic device 900 that can be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 9, the apparatus 900 includes a computing unit 901, which can perform various appropriate actions and processes in accordance with a computer program stored in a Read Only Memory (ROM)902 or a computer program loaded from a storage unit 908 into a Random Access Memory (RAM) 903. In the RAM 903, various programs and data required for the operation of the device 900 can also be stored. The calculation unit 901, ROM 902, and RAM 903 are connected to each other via a bus 904. An input/output (I/O) interface 905 is also connected to bus 904.
A number of components in the device 900 are connected to the I/O interface 905, including: an input unit 906 such as a keyboard, a mouse, and the like; an output unit 907 such as various types of displays, speakers, and the like; a storage unit 908 such as a magnetic disk, optical disk, or the like; and a communication unit 909 such as a network card, a modem, a wireless communication transceiver, and the like. The communication unit 909 allows the device 900 to exchange information/data with other devices through a computer network such as the internet and/or various telecommunication networks.
The computing unit 901 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of the computing unit 901 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The computing unit 901 performs the respective methods and processes described above, such as the image distribution and/or review method. For example, in some embodiments, the image publication and/or review methods may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 908. In some embodiments, part or all of the computer program may be loaded and/or installed onto device 900 via ROM 902 and/or communications unit 909. When the computer program is loaded into the RAM 903 and executed by the computing unit 901, one or more steps of the image publication and/or auditing method described above may be performed. Alternatively, in other embodiments, the computing unit 901 may be configured to perform the image publication and/or audit method in any other suitable manner (e.g., by way of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The Server may be a cloud Server, which is also called a cloud computing Server or a cloud host, and is a host product in a cloud computing service system, so as to solve the defects of high management difficulty and weak service extensibility in the conventional physical host and Virtual Private Server (VPS) service.
By applying the technical scheme provided by the embodiment of the disclosure, the source information embedding mechanism of the integrity checking mechanism and steganography can be sequentially adopted to carry out tampering detection on the image transmission process and the source information embedding process, and more accurate and more comprehensive detection can be carried out on whether the image containing sensitive content is tampered.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present disclosure may be executed in parallel, sequentially, or in different orders, as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved, and the present disclosure is not limited herein.
The above detailed description should not be construed as limiting the scope of the disclosure. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present disclosure should be included in the scope of protection of the present disclosure.

Claims (19)

1. An image publication method, comprising:
acquiring an image to be issued containing sensitive image content;
embedding the encrypted source information of the image to be issued into the image to be issued through steganography to obtain a processed image;
and generating a check code for verifying the integrity of the processed image, and taking the processed image added with the check code as an image to be checked.
2. The method according to claim 1, wherein the embedding the encrypted source information of the image to be published into the image to be published through steganography comprises:
and embedding the encrypted source information of the image to be issued into the image to be issued through Least Significant Bit (LSB) steganography.
3. The method of claim 1, wherein the sensitive image content comprises: at least one item of face image, license plate number information and text information in a preset arrangement format.
4. The method according to claim 3, wherein the embedding the encrypted source information of the image to be published into the image to be published through steganography comprises:
and responding to the fact that the image to be issued contains the face image, and embedding the encrypted source information of the image to be issued into the face of the face image through steganography.
5. The method of any of claims 1-4, wherein the generating a check code for verifying the integrity of the processed image comprises:
and generating a CRC check code of the processed image through a Cyclic Redundancy Check (CRC) technology.
6. An image review method comprising:
receiving an image to be checked, and obtaining a check code and a processed image according to the image to be checked;
verifying the data integrity of the processed image based on the check code and the processed image;
responding to the processed image and passing data integrity verification, and extracting encrypted source information from the image to be processed;
and in response to the encrypted source information being decrypted into readable plaintext by a preset decryption mode, issuing the processed image.
7. The method of claim 6, further comprising:
and responding to the processed image not passing the data integrity verification, and returning the notification information that the processed image is tampered in the transmission process.
8. The method of claim 6, further comprising:
and returning the notification information that the processed image adopts the illegal source information encryption mode in response to that the encrypted source information is the plaintext with the messy code or the non-preset format in the preset decryption mode.
9. An image distribution apparatus comprising:
the image to be issued acquiring unit is configured to acquire an image to be issued containing sensitive image content;
the source information steganography unit is configured to embed the encrypted source information of the image to be issued into the image to be issued through steganography to obtain a processed image;
and the integrity check code adding unit is configured to generate a check code for verifying the integrity of the processed image, and take the processed image added with the check code as an image to be checked.
10. The apparatus of claim 9, the source information steganography unit further configured to:
and embedding the encrypted source information of the image to be issued into the image to be issued through Least Significant Bit (LSB) steganography.
11. The apparatus of claim 9, wherein the sensitive image content comprises: at least one item of face image, license plate number information and text information in a preset arrangement format.
12. The apparatus of claim 9, the source information steganography unit further configured to:
and responding to the fact that the image to be issued contains the face image, and embedding the encrypted source information of the image to be issued into the face of the face image through steganography.
13. The apparatus of any of claims 9-13, wherein the integrity check code appending unit is further configured to:
and generating a CRC check code of the processed image through a Cyclic Redundancy Check (CRC) technology.
14. An image review apparatus comprising:
the image receiving and extracting unit to be audited is configured to receive the image to be audited and obtain a check code and a processed image according to the image to be audited;
a data integrity verification unit configured to verify data integrity of the processed image based on the verification code and the processed image;
a source information extraction unit configured to extract encrypted source information from the image to be processed in response to the processed image passing data integrity verification;
and the audit-passed image issuing unit is configured to issue the processed image in response to the encrypted source information being decrypted into readable plaintext by a preset decryption mode.
15. The apparatus of claim 14, further comprising:
a first notification information returning unit configured to return notification information that the processed image is tampered during transmission in response to the processed image failing to pass data integrity verification.
16. The apparatus of claim 14, further comprising:
and the second notification information returning unit is configured to respond to the encrypted source information being decrypted in a scrambled code or a plaintext in a non-preset format by the preset decryption mode, and return notification information that the processed image adopts an illegal source information encryption mode.
17. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the image publication method of any one of claims 1-5 and/or the image review method of any one of claims 6-8.
18. A non-transitory computer-readable storage medium storing computer instructions for causing the computer to perform the image distribution method of any one of claims 1 to 5 and/or the image review method of any one of claims 6 to 8.
19. A computer program product comprising a computer program which, when executed by a processor, implements an image publication method according to any one of claims 1-5 and/or an image review method according to any one of claims 6-8.
CN202110473054.XA 2021-04-29 2021-04-29 Image publishing and auditing method, related device and computer program product Pending CN113177214A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110473054.XA CN113177214A (en) 2021-04-29 2021-04-29 Image publishing and auditing method, related device and computer program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110473054.XA CN113177214A (en) 2021-04-29 2021-04-29 Image publishing and auditing method, related device and computer program product

Publications (1)

Publication Number Publication Date
CN113177214A true CN113177214A (en) 2021-07-27

Family

ID=76925623

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110473054.XA Pending CN113177214A (en) 2021-04-29 2021-04-29 Image publishing and auditing method, related device and computer program product

Country Status (1)

Country Link
CN (1) CN113177214A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022681A (en) * 2022-05-14 2022-09-06 中国广电广州网络股份有限公司 Method for processing broadcast picture of broadcast television

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040247156A1 (en) * 2003-06-05 2004-12-09 Takashi Otsuki Method, apparatus, and program for image processing capable of preventing, detecting and correcting image alteration, and a medium storing the program
US20050065886A1 (en) * 2003-09-18 2005-03-24 Andelin Victor L. Digitally watermarking documents associated with vehicles
JP2006238455A (en) * 2006-03-07 2006-09-07 Fuji Photo Film Co Ltd Image reproducing method and apparatus and recording medium
CN101409813A (en) * 2007-10-08 2009-04-15 陈诚 Image encoding method for preventing and identifying image tamper
CN101452569A (en) * 2008-12-05 2009-06-10 江南大学 Processing method of image latent writing based on auxiliary pixel
CN107578362A (en) * 2017-05-24 2018-01-12 上海大学 It is embedded in the method for secret information in the picture based on textures synthesis
CN109040760A (en) * 2018-08-19 2018-12-18 同创蓝天投资管理(北京)有限公司 The guard method of network image copyright information, device and storage medium
CN109284614A (en) * 2018-08-10 2019-01-29 五八有限公司 Information Authentication method, apparatus, computer equipment and computer readable storage medium
US20190042796A1 (en) * 2018-06-29 2019-02-07 Intel Corporation Technologies for verifying memory integrity across multiple memory regions
CN109767376A (en) * 2018-12-13 2019-05-17 平安科技(深圳)有限公司 Image authentication method, device, computer equipment and storage medium
CN109816077A (en) * 2019-01-16 2019-05-28 王诗会 A kind of hidden method of two-dimensional barcode information, device, electronic equipment and storage medium
CN110677551A (en) * 2018-07-03 2020-01-10 百度在线网络技术(北京)有限公司 Image encryption method, device, equipment and storage medium
CN112364875A (en) * 2020-11-19 2021-02-12 合肥闪捷信息科技有限公司 Method for tracing paper sensitive file based on histogram binarization
CN112381077A (en) * 2021-01-18 2021-02-19 南京云创大数据科技股份有限公司 Method for hiding face image information
WO2021058936A2 (en) * 2019-08-27 2021-04-01 Alesa Services Ltd Imagery acquisition method and apparatus

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040247156A1 (en) * 2003-06-05 2004-12-09 Takashi Otsuki Method, apparatus, and program for image processing capable of preventing, detecting and correcting image alteration, and a medium storing the program
US20050065886A1 (en) * 2003-09-18 2005-03-24 Andelin Victor L. Digitally watermarking documents associated with vehicles
JP2006238455A (en) * 2006-03-07 2006-09-07 Fuji Photo Film Co Ltd Image reproducing method and apparatus and recording medium
CN101409813A (en) * 2007-10-08 2009-04-15 陈诚 Image encoding method for preventing and identifying image tamper
CN101452569A (en) * 2008-12-05 2009-06-10 江南大学 Processing method of image latent writing based on auxiliary pixel
CN107578362A (en) * 2017-05-24 2018-01-12 上海大学 It is embedded in the method for secret information in the picture based on textures synthesis
US20190042796A1 (en) * 2018-06-29 2019-02-07 Intel Corporation Technologies for verifying memory integrity across multiple memory regions
CN110677551A (en) * 2018-07-03 2020-01-10 百度在线网络技术(北京)有限公司 Image encryption method, device, equipment and storage medium
CN109284614A (en) * 2018-08-10 2019-01-29 五八有限公司 Information Authentication method, apparatus, computer equipment and computer readable storage medium
CN109040760A (en) * 2018-08-19 2018-12-18 同创蓝天投资管理(北京)有限公司 The guard method of network image copyright information, device and storage medium
CN109767376A (en) * 2018-12-13 2019-05-17 平安科技(深圳)有限公司 Image authentication method, device, computer equipment and storage medium
CN109816077A (en) * 2019-01-16 2019-05-28 王诗会 A kind of hidden method of two-dimensional barcode information, device, electronic equipment and storage medium
WO2021058936A2 (en) * 2019-08-27 2021-04-01 Alesa Services Ltd Imagery acquisition method and apparatus
CN112364875A (en) * 2020-11-19 2021-02-12 合肥闪捷信息科技有限公司 Method for tracing paper sensitive file based on histogram binarization
CN112381077A (en) * 2021-01-18 2021-02-19 南京云创大数据科技股份有限公司 Method for hiding face image information

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
M.N.JAYARAM 等: "A STEGANOGRAPHY ALGORITHM FOR HIDING DATA IN AN IMAGE BY ENHANCED LSB SUBSTITUTION METHOD", 《INTERNATIONAL JOURNAL OF PURE AND APPLIED MATHEMATICS》, vol. 120, no. 6, pages 11645 - 11656 *
张祖涛;张家树;和红杰;: "基于脆弱数字水印的人脸图像的安全性", 西南交通大学学报, no. 03, 15 June 2007 (2007-06-15), pages 340 - 344 *
徐明等: "《网络信息安全》", 31 May 2006, 西安:西安电子科技大学出版社, pages: 108 - 114 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022681A (en) * 2022-05-14 2022-09-06 中国广电广州网络股份有限公司 Method for processing broadcast picture of broadcast television

Similar Documents

Publication Publication Date Title
CN104008351B (en) Window application completeness check system, method and device
EP3673392B1 (en) Copyright protection based on hidden copyright information
CN109784870B (en) Contract management method, contract management device, computer equipment and computer readable storage medium
CN111835511A (en) Data security transmission method and device, computer equipment and storage medium
CN112801663B (en) Blockchain certification method, device, system, equipment and medium
WO2021124226A1 (en) Blockchain implemented data hiding solutions for improvements in secure communication, storage and transmission of data
CN110968847A (en) File watermark hiding and analyzing method, device, equipment and storage medium
CN110232021A (en) The method and device of page test
CN113498514A (en) Verifying display of third-party content on a client device
CN112434319A (en) Data encryption method and device for electronic file
CN110545542B (en) Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment
CN114785524A (en) Electronic seal generation method, device, equipment and medium
CN114745373A (en) File transmission method, device, equipment and storage medium
CN111181920A (en) Encryption and decryption method and device
CN108900472B (en) Information transmission method and device
CN113177214A (en) Image publishing and auditing method, related device and computer program product
CN113688399A (en) Firmware digital signature protection method and device, computer equipment and storage medium
CN113177193A (en) Watermark adding method, watermark verifying method and terminal equipment
CN110890979B (en) Automatic deployment method, device, equipment and medium for fort machine
CN114499893B (en) Bidding file encryption and evidence storage method and system based on block chain
CN109995534B (en) Method and device for carrying out security authentication on application program
CN114036364B (en) Method, apparatus, device, medium, and system for identifying crawlers
CN114626968A (en) Watermark embedding method, watermark extracting method and device
CN115001768A (en) Data interaction method, device and equipment based on block chain and storage medium
CN113626848A (en) Sample data generation method and device, electronic equipment and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination