CN1189030C - Positioned Chaos fragile digital implanting and extracting method - Google Patents
Positioned Chaos fragile digital implanting and extracting method Download PDFInfo
- Publication number
- CN1189030C CN1189030C CNB03116160XA CN03116160A CN1189030C CN 1189030 C CN1189030 C CN 1189030C CN B03116160X A CNB03116160X A CN B03116160XA CN 03116160 A CN03116160 A CN 03116160A CN 1189030 C CN1189030 C CN 1189030C
- Authority
- CN
- China
- Prior art keywords
- chaos
- watermark
- image
- iteration
- original image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The present invention relates to a positioned chaos fragile digital watermark implanting and extracting method. Base on the extreme sensitivity of chaos to initial values, a positioned authentication and fragile digital watermark technology is adopted; the grey values of pixels of an original image are mapped to the initial values of the chaos; a watermark image is generated after a plurality of chaos iteration and is then embedded to the LSB plane of the original image. The application of chaos random sequences adds the safety of an algorithm, and the integrity of the watermark image is detected through modifying a discrimination matrix in the process of extracting a watermark. The present invention has the advantages of simple algorithm, easy realization, no need of the original image when extracting the watermark and accurate positioning of the modification of the watermark-added image, and the application range of the present invention is greatly expanded due to the favorable performances.
Description
Technical field:
The present invention relates to a kind of location type chaos fragile digital watermark and embed and extracting method, is that a kind of fragile digital watermark that is specially adapted to authentication, content tampering location and the integrity certification of digital product embeds and extracting method.
Background technology:
In recent years, along with computer and Development of Multimedia Technology, the copyright protection and the content authentication of digital product more and more come into one's own, and digital watermarking is exactly the extensive concern that produces and be subjected to academia under such background.The research of robust digital watermark that is used for copyright protection is more deep; but consider the content integrity authentication of digital product; and the confidence level of the multi-medium data of transmission, this digital watermark can't adapt to this requirement fully, and the fragile watermark technology can realize this point.Fragile watermark should satisfy following characteristics usually: (1) invisibility, and the sensitiveness that distort the adding watermarking images (2), (3) tampering location ability, (4) extract watermark does not need original image.
In the middle of the location type fragile digital watermark of research at present, following two kinds of typical methods are arranged.
(1) index modulation method
In recent years, there are some scholars to propose watermark information to be embedded in the middle of the carrier image abroad with the method for index modulation.In these methods, it is that watermark information is embedded in the coefficient in transform domain greater than certain given threshold value by modulation that a kind of method is relatively effectively arranged, such as list of references " MultipurposeWatermarking for Image Authentication and Protection " (C S Lu, H Y Mark Liao.IEEE Trans on Image Processing.2001,10 (10): 1579-1592) image low frequency sub-band coefficient is just being passed through, negatively-modulated embeds the wavelet domain coefficients greater than certain given threshold value, the watermark information that just can obtain embedding by demodulation during extraction.
But there is following problems in this method:
Problem one is not because propose effective countermeasure at tampering location, so though above-mentioned fragile watermark has the tampering location ability, positioning accuracy is not high.
Problem two, above-mentioned algorithm be owing to exist positive and negative two kinds of modulation, and wherein also have selection of threshold and how to make it the problem that reaches optimum, and institute is not suitable for the occasion of handling in real time so that algorithm implements very complicatedly.
(2) based on the Hash function method of safety
The Hash function is widely used on conventional cipher is learned.Utilize the Hash function that the extreme sensitivity of initial value is realized that fragile watermark is to distorting the focus that responsive requirement also is the research of watermark in recent years.List of references " Hierarchical Watermarking for Secure Image Authentication with Localization " (M U Celik, G Sharma, E Saber, et al.IEEE Trans on Image Processing.2002,11 (6): 585-595) at list of references " Public Key Watermark for Image Verification andAuthentication " (P W Wong.IEEE Int Con on Image Processing.1998, on basis 1:455-459), a kind of classification fragile watermark with tampering location ability is proposed, the original image classification, and by Hash function generation summary, pass through afterwards encrypted private key with the watermark XOR, LSB (the Least Significant Bit that is embedded into original image at last, the minimum bit position) plane, this algorithm progressively improves positioning accuracy by continuous classification, and its major advantage is to have overcome the ineffectivity of vector being attacked (VQ attack).
But there are a lot of problems equally in these Fragile Watermarking Algorithm based on the Hash function of safety.
Problem one, above-mentioned algorithm causes embedding content and comprises mutually because different fractions is enjoyed same LSB plane, so the collision problem when needing partitioning algorithm to solve to embed.
Problem two, similar these traditional tampering location methods generally are based on the sensitiveness of Hash function to distorting, the drawback of this method is: (1) necessary piecemeal, cause the location accurate inadequately, (2) Hash function calculation complexity height, be not suitable for real-time processing, (3) approved safe Hash function kind is few.
In sum, for a well behaved fragile watermark, must meet these points basic demand: (1) is invisible.Be that digital multimedia data after watermarked must have very high Y-PSNR value; (2) has the tamper-proofing ability.Do not need original image when (3) detecting.(4) has the tampering location ability.And prior art still fails well to address these problems.
Summary of the invention:
The objective of the invention is at the deficiencies in the prior art, provide a kind of location type chaos fragile digital watermark to embed and extracting method based on chaotic maps, to the distorting sensitivity and have accurate tampering location ability of data, speed advantage is obvious, and visual effect is good simultaneously.
For realizing such purpose, the present invention is based on the extreme sensitivity of chaos to initial value, adopt the authentication and the Fragile Watermark Technique of location type, the pixel gray value of original image is mapped as the chaos initial value and generates watermarking images through the several times chaos iteration, the LSB plane that is embedded into original image then, utilize the extreme sensitivity of chaos to initial value, can accurately locate adding distorting of watermarking images, stable performance, principle is clear, realization speed is fast, and the extraction of watermark does not need original image.
The present invention includes following concrete steps:
1) chaos iteration: with system key K is the initial value of chaotic maps, obtains chaos random sequence { n by discrete chaos iteration model
l| 1≤n
l≤ 2
m, l=1,2 ..., N
2, this sequence is as the number of times of following chaos iteration.
2) watermark generates: (i, j), (1≤i, the LSB plane zero setting of j≤N) obtains original image X
With
As the initial value of chaos iteration, establish mapping C
0Satisfy
The chaos random sequence n that is produced with system key K
lAs iterations, obtain a real-valued sequence Z of chaos
NlZ
NlBy quantize function Q obtain watermark information S (i, j), promptly
3) watermark embeds: right
Each the some implementation step 2 operation, obtain watermark S.S is embedded into watermark
The LSB plane, obtained watermarked image WX thus.
4) watermark extracting: to the LSB plane zero setting of the watermarked image received, be used as the initial value of chaos, according to the chaos iteration number of times that generates by key, obtain watermark S then by chaos iteration with its pixel gray value
ExCompare S
ExWith the corresponding position on the LSB plane of WX, if S
ExAll the same with corresponding position, the LSB plane of WX, show that original image is not distorted, otherwise point inequality is detected distorting a little.
Fragile Watermark Algorithm based on chaotic maps of the present invention is for the authentication and the fragile digital watermark of location type have been opened up a new path.Watermarked by the LSB plane of revising original image, obtained higher Y-PSNR.The application of chaos random sequence has increased the fail safe of algorithm.Algorithm is simple, realizes easily, does not need original image when extracting watermark, and can accurate localization for adding distorting of watermarking images, and these good performances have increased its range of application greatly.
Description of drawings:
Fig. 1 is a watermarking algorithm block diagram of the present invention.
Fig. 2 is watermark extracting of the present invention and verification process block diagram.
Fig. 3 revises for picture material and detects embodiment.
Wherein, Fig. 3 (a) is the image that is embedded with watermark before distorting, the image of Fig. 3 (b) for distorting, and Fig. 3 (c) is for distorting testing result, and Fig. 3 (d) is the magnification region before distorting, and Fig. 3 (e) is the magnification region after distorting.
Fig. 4 detects embodiment for picture material increases.
Wherein, Fig. 4 (a) is the image that is embedded with watermark before distorting, the image of Fig. 4 (b) for distorting, and Fig. 4 (c) is for distorting testing result.
Embodiment:
Below in conjunction with drawings and Examples technical scheme of the present invention is further described.
1) chaos iteration
With system key K is the initial value of chaos iteration, obtains chaos random sequence { n
l| 1≤n
l≤ 2
m, l=1,2 ..., N
2, this sequence is as the number of times of following chaos iteration.
In the scheme that the present invention proposes, repeatedly use chaos system to produce pseudo random sequence.Chaos is nonlinear equation (group) separating under given conditions, and exporting at random by an equation (group) of determining of it determines.The initial parameter of chaos system can be used as the key of whole watermaking system, and the characteristics of performance at random that chaos system is good and regeneration have easily increased the security performance of system.Below be example with the one-dimensional discrete chaotic maps, f:U → U, U R
z(n+1)=f(λ,z(n)),λ∈R,z(n)∈U
N=0 wherein, 1, Λ represents iterations, λ is the parameter of control system chaotic behavior.The following formula iteration obtains real-valued chaos sequence for n time and is designated as
Z
n={z(1),z(2),...,z(n)}
Be defined as follows quantization function
V=Q(Z
n,d)
Wherein
D represent to return 0, the number of 1} bit.Because chaos to the extreme sensitivity of initial value, therefore for different slightly initial values, will obtain diverse two sequences.
If E={E
0, E
1..., E
Q-1Be limited cutting apart on the U,
The limited E of cutting apart according to mapping f can obtain symbol sebolic addressing ω, and if only if measure entropy h (f)=log
2During q, ω is the Bernoulli sequence.Decimal system chaos sequence can be got the m bit in turn by binary symbol sequence ω and obtain.
2) generation of watermark
For size is that (i, j), (1≤i, j≤N), its LSB plane zero setting obtains for the original image X of N * N
With
Initial value z as chaos iteration
I, j(0), establishes mapping C for this reason
0Satisfy
Then watermark signal S:S (i, j) ∈ 0,1} is produced by following formula:
Iterations n wherein
lGet the decimal system chaos sequence { n that is produced by system key K successively
l| 1≤n
l≤ 2
m, l=1,2 ..., N
2In element, K can be used as the key of whole fragile watermark system.
3) embedding of watermark
Watermarked image is obtained by following formula
(a, b) expression is embedded into two-value plane b the operation on the LSB plane of a to function Add.
Such scheme causes the increase of computation complexity because each picture element is all wanted the chaotic maps iteration repeatedly.Improve such scheme below,
Be divided into size and be the fritter of c * c, for each fritter
(1≤i, j≤c), calculate
Wherein
Improve algorithm with all pixel gray values of each fritter and be mapped as the chaos initial value, each chaotic maps iteration is returned the binary sequence of block sizes number.Note S ':
Be the watermark of improvement project, the samely obtain watermarked image
4) watermark extracting and authentication
The watermark extracting algorithm block diagram to the LSB plane zero setting of the watermarked image received, is used as the initial value of chaos with its pixel gray value as shown in Figure 2, according to the chaos iteration number of times that is generated by key, obtains watermark S by chaos iteration then
Ex
Discriminant function is distorted in definition:
T=|S
ex-LSB(WX)|
Wherein LSB (.) is defined as the LSB plane of getting image.
If S
Ex=LSB (WX), then T=[0]
N * N, show that original image is not distorted.Otherwise be that 1 point is represented the point distorted in the original image in the matrix T.
Effect of the present invention can be verified by following performance evaluation:
Sensitivity analysis
Fragile watermark requires the watermark of adding not discernable.Watermark signal is embedded into the LSB plane of image, establishes P
E1For declaring into 1 or declare into 0 error probability to 1 to 0, know P by the independence of each bit of LSB plane
E1=0.5.Analyze theoretically, algorithm of the present invention will obtain very high Y-PSNR value, satisfy the requirement of fragile watermark to imperceptibility.
The tampering location capability analysis
Utilize the characteristics of chaotic maps, to adding distorting this algorithm and locating exactly of watermarking images, thereby make it to have content tampering proof and integrity certification ability the initial value extreme sensitivity.
Pseudo-random characteristics by chaos knows, as fruit dot WX (i j) is distorted, and then passes through chaos iteration, detect this point and distorted, promptly T (i, probability j)=1 is:
P{T(i,j)=1}=0.5
So for the image that adds watermark, on the probability statistics meaning, 50% distort a little and be detected will be arranged, and these be detected distort the tampered region that is distributed in of naming a person for a particular job at random.
Computation complexity is analyzed
For the watermarking algorithm of a practicality, require its computation complexity low, the real-time processing that so easy realization watermark embeds and extracts.Watermark proposed by the invention embeds and extracts is the process of two symmetries, and its computation complexity is the same order of magnitude.For embedding algorithm, its computation complexity is by the number of times decision of original image size and chaos iteration.If the mathematic expectaion of the number of times of the chaos iteration of each point is E (n
r), the computation complexity that then embeds algorithm is:
As seen,
The c value is big more, and computation complexity is low more, but positioning accuracy will decrease, and compromisely considers so must do on computation complexity and positioning accuracy.
Embodiment
With Matlab 6 simulation algorithm of the present invention, what be of practical significance below the consideration distorts embodiment.
Revise among the embodiment in a picture material of the present invention, for 512 * 512 * 8 ' Jet ' gray-scale map, the image that adds watermark is shown in Fig. 3 (a), and Y-PSNR is 51.1dB.Suppose that " US AIR FORCE " on the airframe among ' Jet ' figure made into " UN AIR FORCE " promptly makes alphabetical S into N, shown in Fig. 3 (b), for the content that observation post more clearly distorts, Fig. 3 (d) and Fig. 3 (e) are the enlarged image of this zone before and after distorting.Utilize the algorithm that the present invention proposes to detect distorting of being done, the tampered region testing result is shown in Fig. 3 (c), and visible the present invention has good sensitiveness and the tampering location ability of distorting.
Increase among the embodiment in a picture material of the present invention, for 512 * 512 * 8 ' Peppers ' gray-scale map, the image that adds watermark is shown in Fig. 4 (a), and Y-PSNR is 51.2dB.If add two capsicums again shown in Fig. 4 (b) on the image that adds watermark, the algorithm that utilizes the present invention to propose detects this and distorts, the tampered region testing result is shown in Fig. 4 (c).As seen the present invention can point-devicely locate distorting of picture material, and the tampered region profile is obvious.
The present invention is very responsive as additive Gaussian noise, JPEG compression, stripping, medium filtering, sharpening, histogram equalization, veining, shearing, Gaussian Blur etc. to common image processing operation in addition, can both locate seizure well to the tampered region.
Claims (1)
1, a kind of location type chaos fragile digital watermark embeds and extracting method, comprises following concrete steps:
1) chaos iteration: with system key K is the initial value of chaotic maps, obtains chaos random sequence { n by discrete chaos iteration model
l| 1≤n
l≤ 2
m, l=1,2 ..., N
2, this sequence is as the number of times of following chaos iteration;
2) watermark generates: (i, j), (1≤i, the minimum bit position LSB plane zero setting of j≤N) obtains original image X
With
As the initial value of chaos iteration, establish mapping C
0Satisfy
The chaos random sequence n that is produced with system key K
lAs iterations, obtain a real-valued sequence Z of chaos
Nl, Z
NlBy quantize function Q obtain watermark information S (i, j), promptly
3) watermark embeds: right
Each the some implementation step 2 operation, obtain watermark S, S is embedded into watermark
The LSB plane, obtained watermarked image WX thus;
4) watermark extracting: to the LSB plane zero setting of the watermarked image received, be used as the initial value of chaos, according to the chaos iteration number of times that generates by key, obtain watermark S then by chaos iteration with its pixel gray value
Ex, compare S
ExWith the corresponding position on the LSB plane of WX, if S
ExAll the same with corresponding position, the LSB plane of WX, show that original image is not distorted, otherwise point inequality is detected distorting a little.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB03116160XA CN1189030C (en) | 2003-04-03 | 2003-04-03 | Positioned Chaos fragile digital implanting and extracting method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB03116160XA CN1189030C (en) | 2003-04-03 | 2003-04-03 | Positioned Chaos fragile digital implanting and extracting method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1440197A CN1440197A (en) | 2003-09-03 |
CN1189030C true CN1189030C (en) | 2005-02-09 |
Family
ID=27797096
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB03116160XA Expired - Fee Related CN1189030C (en) | 2003-04-03 | 2003-04-03 | Positioned Chaos fragile digital implanting and extracting method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1189030C (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1322433C (en) * | 2004-08-12 | 2007-06-20 | 西南交通大学 | Positioning vulnerable water print generating and recognizing method capable of distigushing image and watermark distortion |
CN1294531C (en) * | 2004-12-06 | 2007-01-10 | 西南交通大学 | Generating and authenticating method for positioned authenticating water-mark for recoverying distorted image contents |
CN101282457B (en) * | 2005-02-06 | 2010-06-02 | 陆健 | False proof detection method for real time monitoring videosignal |
CN100340111C (en) * | 2005-03-28 | 2007-09-26 | 南方医科大学 | Medical image fragile watermark method based on wavelet transform |
CN100461214C (en) * | 2007-07-26 | 2009-02-11 | 北京交通大学 | Image authentication method based on feedback chaos system and neighborhood assistance |
CN101141466B (en) * | 2007-10-26 | 2010-08-11 | 北京交通大学 | Document authentication method based on interweaving watermark and biological characteristic |
CN101442671B (en) * | 2007-11-21 | 2010-12-08 | 华为技术有限公司 | Method and apparatus for embedding and extracting digital information |
CN106408495B (en) * | 2015-11-06 | 2019-10-18 | 河南师范大学 | A kind of high PSNR vulnerable watermark method based on chaology |
CN105956990B (en) * | 2016-04-27 | 2019-10-15 | 广西财经学院 | A kind of universal large capacity image lossless Information Hiding Algorithms |
CN111161259B (en) * | 2019-12-31 | 2021-06-22 | 支付宝(杭州)信息技术有限公司 | Method and device for detecting whether image is tampered or not and electronic equipment |
CN111274550B (en) * | 2020-01-19 | 2022-11-04 | 牡丹江医学院 | Chaos random sequence based protection method for digital copyright of multimedia stream file |
-
2003
- 2003-04-03 CN CNB03116160XA patent/CN1189030C/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN1440197A (en) | 2003-09-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1189030C (en) | Positioned Chaos fragile digital implanting and extracting method | |
CN101079101A (en) | Zernike moment based robust hashing image authentification method | |
CN1445722A (en) | Method and device for detecting image copy of contents | |
CN1835018A (en) | Block fragile watermark generation and authentication method based on chaos hash function | |
CN104504669A (en) | Median filtering detection method based on local binary pattern | |
CN1517855A (en) | Image digital watermark method | |
CN1256705C (en) | Small wave region digital water marking mathod based on image target region | |
CN102184244B (en) | High-robustness geographical database watermark method suitable for polygon type | |
CN1322433C (en) | Positioning vulnerable water print generating and recognizing method capable of distigushing image and watermark distortion | |
CN102956025B (en) | Image watermark detection method and system | |
CN1246779C (en) | Embedding and extracting method for wavelet domain chaotic semi-frageile digit water print | |
CN104156909B (en) | The robust reversible watermark insertion of image content-based and detection method | |
CN1195378C (en) | Chaos based robustness invisuable implanting and extracting method | |
CN109118419B (en) | Image copy detection method based on local spatial domain and frequency domain | |
CN1885339A (en) | Electronic stamp certification method based on image features | |
CN1184795C (en) | Fragile digital water print embedding and extracting method based on address code | |
CN1315091C (en) | Digital image recognising method based on characteristics | |
CN1294531C (en) | Generating and authenticating method for positioned authenticating water-mark for recoverying distorted image contents | |
CN1251140C (en) | Encrypting orthogonal transformation method for digital watermark | |
CN110417551B (en) | Character and picture generation type camouflage and recovery method combined with error diffusion | |
CN1710610A (en) | Digital watermark anti fake method in anti-digital-to-analog conversion process | |
CN1525387A (en) | Device and method for detecting blurring of image | |
Kumar et al. | Image steganography using index based chaotic mapping | |
Chutani et al. | LSB embedding in spatial domain-a review of improved techniques | |
Zhao et al. | Perceptual image hash for tampering detection using Zernike moments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C19 | Lapse of patent right due to non-payment of the annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |