CN1658223A - Digital image recognising method based on characteristics - Google Patents
Digital image recognising method based on characteristics Download PDFInfo
- Publication number
- CN1658223A CN1658223A CN 200510033662 CN200510033662A CN1658223A CN 1658223 A CN1658223 A CN 1658223A CN 200510033662 CN200510033662 CN 200510033662 CN 200510033662 A CN200510033662 A CN 200510033662A CN 1658223 A CN1658223 A CN 1658223A
- Authority
- CN
- China
- Prior art keywords
- image
- zmm
- low frequency
- frequency sub
- watermark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000012545 processing Methods 0.000 claims abstract description 12
- 230000009466 transformation Effects 0.000 claims description 4
- 238000013139 quantization Methods 0.000 claims description 2
- 238000012795 verification Methods 0.000 claims description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 abstract 4
- 241001504519 Papio ursinus Species 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 238000011160 research Methods 0.000 description 3
- 230000008485 antagonism Effects 0.000 description 2
- 238000005282 brightening Methods 0.000 description 2
- 238000007906 compression Methods 0.000 description 2
- 230000006835 compression Effects 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 241001528553 Malus asiatica Species 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 238000013144 data compression Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Images
Landscapes
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
This invention is a digital image attestation method based on half-perished water attestation. This invention puts the original image with half-perished water character as water mark, and embeds it into the image by structured method. When the image needs the attestation, picks up the water mark through judgment, that is, the error between of the character of the original image and the character of the attesting image is in the receivable range, in order to attest the image whether reliable. This invention can judge whether the process of the image is sophisticating or formally processing, and can precisely locate the position of the sophistication and belongs to the field of multi-media signal processing. This invention provides a new method to the digital image attestation.
Description
Technical field
The present invention is a kind of based on semi-fragile watermarking, can judge correctly that the processing to image is that malice is distorted or normal image processing, and can belong to field of multimedia signal processing to the pinpoint visual authentication method in the position of distorting.
Background technology
Along with most of multimedia file layout digitizings,, can at an easy rate media information be made amendment and copy by using software for editing.In some occasion, it is believable that multi-medium data must be proved to be, and also promptly do not suffer to distort mala fide.Traditional information integrity resist technology based on digital signature is applied to multimedia messages and comes with some shortcomings.For example, too responsive to normal signal Processing (as data compression, signal filtering etc.) and interchannel noise (as wireless channel etc.), can't the positioning tampering position etc.
Digital watermarking is the multimedia signal dispose and the information security technology crossing research direction that just form of the middle and later periods nineties in the world.Because digital watermarking is to be suggested as the method that solves the multimedia copyright problem, up to the present, the research emphasis in digital watermarking field concentrates on the robust watermarking always.Comparatively speaking, the research of fragile watermark is started late comparatively speaking.Because its specific use in data integrity confirms has obtained people's great attention in recent years.Except copyright protection, digital watermarking also can be used for the validation problem of distorting of no less important.Its main technical requirements is to distort very responsive and the accurate positioning tampering position of energy for malice, simultaneously, must be robust to normal signal Processing or noise, and the image through normal process when promptly verifying is considered to believable.
The method of utilizing digital watermarking to carry out the image authentication at present mainly realizes at the transform domain of image, mainly biases toward the robustness for JPEG when robustness is tested.Wherein the image authentication method that quantizes of the wavelet domain coefficients that is proposed by Kundur and Hatzinakos is more representative, and its watermark and picture material are irrelevant.Antagonism Jpeg compression is up to Q=50, and be 32 * 32 plot for the detectability of distorting this moment.Using at present digital watermark, to carry out the watermark and the image of most methods of image authentication irrelevant, and bearing accuracy and robustness aspect await improving.
Summary of the invention
The objective of the invention is to propose a kind of authentication method, both can determine whether image is believable, can accurately locate the position that malice is distorted again simultaneously based on characteristics of image.
Method of the present invention is divided into watermark and embeds and two processes of image authentication, utilization judges that based on the semi-fragile watermarking of the feature of image is correct processing to image is that malice is distorted or normal image processing is accurately located the position of distorting during the image authentication, concrete steps are: watermark embed process is as follows: 1) raw image is carried out 3 grades of 2-D DWT (DiscreteWavelet Transform), extract DWT low frequency sub-band coefficient; 2) the low frequency sub-band coefficient is mapped on the 0-255 level gray scale, obtains low frequency sub-band figure; 3) extract the edge of low frequency sub-band figure and carry out binaryzation; 4) on binary image, calculate 49 ZMM (zernike moment magnitude); 5) be 16 with the ZMM uniform quantization, and get the highest 4 significance bits as semi-fragile watermarking; 6) be embedded into semi-fragile watermarking in the HL3 subband of DWT with structurized method; 7) wavelet inverse transformation obtains the image of embed watermark.The image verification process does not need raw image, and step is as follows: 1) treat image and carry out 3 grades of 2-D DWT (Discrete Wavelet Transform), extract DWT low frequency sub-band coefficient; 2) the low frequency sub-band coefficient is mapped on the 0-255 level gray scale, obtains low frequency sub-band figure; 3) extract the edge of low frequency sub-band figure and carry out binaryzation; 4) calculate 49 ZMM (zernike moment magnitude) on binary image, note is ZMM_A; 5) extract the watermark information in the HL3 subband and be converted into 49 ZMM (zernike momentmagnitude), note is ZMM_O; 6) calculate successively 49 corresponding ZMM_A and ZMM_O difference square, and judge whether to have surpassed preset threshold, if exist 1 to surpass threshold value, think that then this image suffered malicious attack; 7) position that distorted by malice is determined in the position that embeds according to structuring.
The more detailed description of the inventive method is:
1: wavelet transformed domain has the extraction of the characteristics of image of half fragile characteristic
At first image is carried out 3 grades of DWT of 2-D, obtain 10 subband { LH
i, HL
i, HH
i, LL
3, i=1-3}, wherein LL
3Subband is that the low pass of raw image is approximate, has concentrated most of energy of picture intelligence.Utilize the edge extracting algorithm to extract the edge of low frequency sub-band coefficient figure and carry out binaryzation, on binary image, calculate 49 ZMM (Zernikemoments magnitude), and it is normalized to decimal between the 0-1.Its calculating and method for normalizing are referring to Alireza Khotanzao and Yaw huahong, " Invariant Image Recognition by ZernikeMoments; " IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINEINTELLIGENC, VOL.12, NO.5, MAY 1990.ZMMs has the robustness to JPEG, noise, translation, rotation, convergent-divergent, but it is again the description feature of picture shape simultaneously, when picture material is replaced, will cause the bigger variation of ZMM, therefore has half fragile characteristic.The present invention is quantified as 16 with each ZMM, gets the highest 4 HL3 subbands that are embedded into the DWT territory as watermark.
2: the structuring of watermark embeds
Behind 3 grades of wavelet transformations in wavelet coefficient values of HL3 subband and the real image 8 * 8 piece relevant.The piece of same HL3 subband 2 * 2 is relevant with 16 * 16 of real images.The present invention is embedded into high 4 forms with 2 * 2 piece of each ZMM in the HL3 subband successively, and 16 * 16 piece is distorted the value that may change a square in real image so.Can determine the position that malice is distorted according to the position of the square that has changed in when authentication.The embedding grammar of each watermark is as follows:
Earlier (a, b) and G_LSB5 (a), wherein (a, b) expression is with low five low five of replacing a of b, hangs down five and a is taken out in G_LSB5 (a) expression for S_LSB5 for two variable S_LSB5 of definition.When we will embed bit ' 1 ', use formula
When we will embed bit ' 0 ', use formula
Wherein, F
i(u v) is a small echo HL3 sub-band coefficients, F
i' (u v) is that watermark embeds the back coefficient.
Carry out wavelet inverse transformation at last, obtain the image of embed watermark.
3: authentication method
At first treat authentication image and carry out 3 grades of DWT of 2-D, obtain 10 subband { LH
i, HL
i, HH
i, LL
3, i=1-3}.Utilize Canny edge extracting algorithm to extract the edge of low frequency sub-band coefficient figure and carry out binaryzation, on binary image, calculate 49 ZMM (Zernike moments magnitude), and it is normalized to decimal between the 0-1.These ZMM have represented the feature of image to be certified, are called ZMM_A.
Press embedded structure at the HL3 subband and extract watermark in the piece 2 * 2 successively, 49 ZMM of reconstituting initial image are called ZMM_O.
Calculate successively 49 ZMM_A and ZMM_O difference square, with selected threshold value 0.003 relatively, if greater than threshold value, think that then the embedded location place of this ZMM correspondence has suffered that malice distorts, 16 * 16 of corresponding spatial domain.If there is 1 to be determined and to have suffered that malice distorts, image then to be certified is considered to incredible.
The present invention relatively has following advantage with existing image authentication technology based on watermark:
1) with the feature of image itself as the watermark embedded images, and utilize the difference between the feature to authenticate, make authentication result more reliable.
2) a kind of effective structuring embedding grammar has been proposed.Whether be reliably, can also provide the position that malice is distorted if when authentication, not only can provide image to be certified.
3) the algorithm invisibility of the present invention's proposition is good, and is better to the robustness that normal image is handled, and malice is distorted the comparison sensitivity, and bearing accuracy is higher.The PSNR value of image is more than the 43dB behind the inventive method embed watermark, and the robustness of antagonism JPEG reaches Q=50, is S=3 to antimierophonic intensity, and S=3 represents the random noise between the original image stack [15,15].When image generation content tampering, authentication will think that this image is incredible, and the bearing accuracy of distorting is 16 * 16 piece.
Description of drawings
Provide the application of method in the image authentication that the present invention proposes in the accompanying drawing.What provide among the accompanying drawing 1-6 is the experimental result of image Lena and Baboon (size is 352 * 288).
Fig. 1 is authentication method figure behind the embed watermark in Lena that the present invention proposes, wherein
(a) being the Lena original graph, (b) is the figure PSNR=44.15 behind the embed watermark.
Fig. 2 is authentication method figure behind the embed watermark in Baboon that the present invention proposes, wherein
(a) being the Baboon original graph, (b) is the figure PSNR=45.14 behind the embed watermark.
The authentication result of the authentication method that Fig. 3-the 5th, the present invention propose when the Lena image is distorted by malice.
Fig. 3 (a) is the local brightening hair portion of Fig. 1 (b), the tampering location figure that Fig. 3 (b) provides when being image authentication;
Fig. 4 (a) increases a label, the tampering location figure that Fig. 4 (b) provides when being image authentication among Fig. 1 (b).
Fig. 5 (a) is the local fuzzy face of Fig. 1 (b), the tampering location figure that Fig. 5 (b) provides when being image authentication.
Fig. 6 is the authentication result of authentication method when the Baboon image is distorted by malice that the present invention proposes.Wherein
(a) be that among Fig. 2 (b) one is replaced, naked eyes be can't see the tampering location figure that (b) provides when being image authentication.
Embodiment
Along with the develop rapidly of computer and network technologies, make the interchange of multimedia messages reach the unprecedented degree of depth and range.Yet, multimedia messages in transmission course, can suffer all kinds of be not intended to or have a mind to distort attack, this makes people produce the authenticity of the integrality of Digital Media (digital picture, DAB, digital video) and content to query.If when distorting important contents such as relating to national security, court's proof, historical document, may cause the loss of bad social influence or great political economy.Therefore, how in network environment, authenticity, the integrality of digital media content are implemented effective protection has become a stern reality problem.Be applied to maturely based on cryptographic conventional encryption technique in the protection of digital media content under the encrypted state.But along with the development of computer hardware technique, the possibility that password is decrypted is increasing, even illicit interception person can't decode after intercepting and capturing ciphertext, but sends after it can being destroyed again, and makes the message that receives can't be translated into expressly.In addition, the authentication method in the cryptography not only needs to preserve message authentication code in addition, and authenticates the change that does not admit of a bit, has then overcome the shortcoming of conventional cryptography method based on the authentication techniques of watermark.The present invention at first utilizes the feature of image itself to be embedded in the image as watermark, when image is carried out be normal image processing the time, think during authentication that image is believable, and when image is subjected to malice and distorts, can judge that not only image is incredible, but also position that can positioning tampering.
Introduce using method below based on the visual authentication method of feature.
Statement is now finished the process that watermark embeds and detects with method of the present invention.Here provided the test result of making experiment of Lena and these two representative images of Baboon, size of images does not influence test result.Have two aspects: invisibility, the fragility and the tampering location of distorting to the robustness of normal Flame Image Process such as JPEG compression, noise, to malice.
Fig. 1 shows with the result of the inventive method to image Lena embed watermark.Fig. 1 (a) is an original image, and the image of embed watermark is presented among Fig. 1 (b), and its PSNR (Peak Signal Noise Ratio) is 44.15dB.The frame that has embedded watermark as seen from the figure visually with the primitive frame no significant difference.Satisfy the requirement of invisibility.
Fig. 2 shows with the result of the inventive method to image B aboon embed watermark.Fig. 2 (a) is an original image, and the image of embed watermark is presented among Fig. 2 (b), and its PSNR (Peak Signal Noise Ratio) is 45.13dB.The frame that has embedded watermark as seen from the figure visually with the primitive frame notable difference.Satisfy the requirement of invisibility.
The authentication result of the authentication method that Fig. 3-the 5th, the present invention propose when the Lena image is distorted by malice.Hair portion in Fig. 1 (b), is considered to image has been carried out artificial distorting when authentication by local brightening shown in Fig. 3 (a), is incredible, can provide the position of distorting simultaneously, shown in Fig. 3 (b).When in Fig. 1 (b), increasing a label, shown in Fig. 4 (a), when authentication, be considered to image has been carried out artificial distorting, be incredible.Simultaneously can provide the position of distorting, shown in Fig. 4 (b).Face in Fig. 1 (b), is considered to image has been carried out artificial distorting when authentication by the fuzzy quilt in part shown in Fig. 5 (a), is incredible, can provide the position of distorting simultaneously, shown in Fig. 5 (b).
Fig. 6 is the authentication result of authentication method when the Baboon image is distorted by malice that the present invention proposes.One in Fig. 2 (b) is replaced, and shown in Fig. 6 (a), the target frame is to be replaced part among the figure, though naked eyes be can't see, when authentication, be considered to image has been carried out artificial distorting, be incredible, simultaneously can provide the position of distorting, shown in Fig. 6 (b).
Claims (2)
1, a kind of digital image recognising method based on feature is characterized in that this method is divided into watermark and embeds and two processes of image authentication.Utilize during the image authentication based on the semi-fragile watermarking of image feature is correct and judge that the processing to image is that malice is distorted or normal image processing, and the position of distorting is accurately located.Concrete steps are: watermark embed process is as follows: 1) raw image is carried out 3 grades of 2-D DWT (Discrete Wavelet Transform), extract DWT low frequency sub-band coefficient; 2) the low frequency sub-band coefficient is mapped on the 0-255 level gray scale, obtains low frequency sub-band figure; 3) extract the edge of low frequency sub-band figure and carry out binaryzation; 4) on binary image, calculate 49 ZMM (zernike moment magnitude); 5) be 16 with the ZMM uniform quantization, and get the highest 4 significance bits as semi-fragile watermarking; 6) be embedded into semi-fragile watermarking in the HL3 subband of DWT with structurized method; 7) wavelet inverse transformation obtains the image of embed watermark.The image verification process does not need raw image, and step is as follows: 1) treat image and carry out 3 grades of 2-D DWT (Discrete Wavelet Transform), extract DWT low frequency sub-band coefficient; 2) the low frequency sub-band coefficient is mapped on the 0-255 level gray scale, obtains low frequency sub-band figure; 3) extract the edge of low frequency sub-band figure and carry out binaryzation; 4) calculate 49 ZMM (zernikemoment magnitude) on binary image, note is ZMM_A; 5) extract the watermark information in the HL3 subband and be converted into 49 ZMM (zernike moment magnitude), note is ZMM_O; 6) calculate successively 49 corresponding ZMM_A and ZMM_O difference square, and judge whether to have surpassed preset threshold, if exist 1 to surpass threshold value, think that then this image suffered malicious attack; 7) position that distorted by malice is determined in the position that embeds according to structuring.
2, a kind of digital image recognising method based on feature according to claim 1 is characterized in that: watermark embedding method be that 4 high significance bits of 1 ZMM structured form with 2 * 2 piece is embedded.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB200510033662XA CN1315091C (en) | 2005-03-23 | 2005-03-23 | Digital image recognising method based on characteristics |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB200510033662XA CN1315091C (en) | 2005-03-23 | 2005-03-23 | Digital image recognising method based on characteristics |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1658223A true CN1658223A (en) | 2005-08-24 |
CN1315091C CN1315091C (en) | 2007-05-09 |
Family
ID=35007695
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB200510033662XA Expired - Fee Related CN1315091C (en) | 2005-03-23 | 2005-03-23 | Digital image recognising method based on characteristics |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1315091C (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100399353C (en) * | 2006-07-07 | 2008-07-02 | 中山大学 | Electronic stamp certification method based on image features |
CN100585616C (en) * | 2006-08-14 | 2010-01-27 | 索尼株式会社 | Authentication apparatus and authentication method |
WO2011026365A1 (en) * | 2009-09-03 | 2011-03-10 | 中兴通讯股份有限公司 | Method and system for embedding and extracting image digital watermark |
CN102542278A (en) * | 2012-01-16 | 2012-07-04 | 北方工业大学 | Adaptive characteristic point extraction and image matching based on discrete wavelet transformation (DWT) |
CN103955880A (en) * | 2014-04-11 | 2014-07-30 | 杭州电子科技大学 | DWT-SVD robust blind watermark method based on Zernike moments |
CN104700345A (en) * | 2015-01-16 | 2015-06-10 | 天津科技大学 | Method for improving detection rate of semi-fragile watermark authentication by establishing Benford's law threshold value library |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6332030B1 (en) * | 1998-01-15 | 2001-12-18 | The Regents Of The University Of California | Method for embedding and extracting digital data in images and video |
CN1141835C (en) * | 2002-04-19 | 2004-03-10 | 中山大学 | Method for protecting multimedia video data |
CN1538287A (en) * | 2003-04-14 | 2004-10-20 | 中国科学院自动化研究所 | Radio electronic bill generating and deteeting method |
-
2005
- 2005-03-23 CN CNB200510033662XA patent/CN1315091C/en not_active Expired - Fee Related
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100399353C (en) * | 2006-07-07 | 2008-07-02 | 中山大学 | Electronic stamp certification method based on image features |
CN100585616C (en) * | 2006-08-14 | 2010-01-27 | 索尼株式会社 | Authentication apparatus and authentication method |
WO2011026365A1 (en) * | 2009-09-03 | 2011-03-10 | 中兴通讯股份有限公司 | Method and system for embedding and extracting image digital watermark |
US8615103B2 (en) | 2009-09-03 | 2013-12-24 | Zte Corporation | Method and system for embedding and extracting image digital watermark |
CN102542278A (en) * | 2012-01-16 | 2012-07-04 | 北方工业大学 | Adaptive characteristic point extraction and image matching based on discrete wavelet transformation (DWT) |
CN103955880A (en) * | 2014-04-11 | 2014-07-30 | 杭州电子科技大学 | DWT-SVD robust blind watermark method based on Zernike moments |
CN103955880B (en) * | 2014-04-11 | 2018-03-13 | 杭州电子科技大学 | DWT SVD Robust Blind Watermarking Scheme methods based on Zernike squares |
CN104700345A (en) * | 2015-01-16 | 2015-06-10 | 天津科技大学 | Method for improving detection rate of semi-fragile watermark authentication by establishing Benford's law threshold value library |
CN104700345B (en) * | 2015-01-16 | 2017-10-17 | 天津科技大学 | Set up the method that Ben Fude laws threshold library improves semi-fragile watermarking authentication checks rate |
Also Published As
Publication number | Publication date |
---|---|
CN1315091C (en) | 2007-05-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hu et al. | Cover-lossless robust image watermarking against geometric deformations | |
Sun et al. | A SVD-and quantization based semi-fragile watermarking technique for image authentication | |
Zhu et al. | When seeing isn't believing [multimedia authentication technologies] | |
CN100394443C (en) | Reversible watermark method for image certification | |
CN101059863A (en) | Embed and detection method for identifying water mark, its system and uses | |
He et al. | A wavelet-based fragile watermarking scheme for secure image authentication | |
CN1315091C (en) | Digital image recognising method based on characteristics | |
CN100399353C (en) | Electronic stamp certification method based on image features | |
Koliwad | A comprehensive survey of contemporary researches in watermarking for copyright protection of digital images | |
Liu et al. | Semi-fragile zernike moment-based image watermarking for authentication | |
Chouhan et al. | Fingerprint Authentication by Wavelet-based Digital Watermarking. | |
Wang et al. | LBP and DWT based fragile watermarking for image authentication | |
Jain et al. | Fragile watermarking for image authentication: survey | |
Zhang et al. | Image authentication based on digital signature and semi-fragile watermarking | |
Vatsa et al. | Comparing robustness of watermarking algorithms on biometrics data | |
Zhu et al. | Multimedia authentication and watermarking | |
CN115272039A (en) | Watermark attack method and system based on GAN and digital watermark embedding method | |
CN100559856C (en) | A kind of video-frequency identifying method based on wavelet transformation and mixed watermark | |
Chang et al. | A multipurpose wavelet-based image watermarking | |
Zhao et al. | Image forensics using generalised Benford's law for accurate detection of unknown JPEG compression in watermarked images | |
Lu | On the security of structural information extraction/embedding for images | |
Chouhan et al. | Robust Minutiae Watermarking in Wavelet Domain for Fingerprint Security | |
Li et al. | A secure semi-fragile self-recoverable watermarking algorithm using group-based wavelet quantization | |
Liu et al. | Binary image authentication using zernike moments | |
Phadikar et al. | QIM data hiding for tamper detection and correction in digital images using wavelet transform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20070509 Termination date: 20100323 |