CN1664849A - Image identification method based on parameter integer wavelet transformation - Google Patents

Image identification method based on parameter integer wavelet transformation Download PDF

Info

Publication number
CN1664849A
CN1664849A CN 200510033657 CN200510033657A CN1664849A CN 1664849 A CN1664849 A CN 1664849A CN 200510033657 CN200510033657 CN 200510033657 CN 200510033657 A CN200510033657 A CN 200510033657A CN 1664849 A CN1664849 A CN 1664849A
Authority
CN
China
Prior art keywords
watermark
parameter
image
wavelet transformation
parameter integer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200510033657
Other languages
Chinese (zh)
Inventor
黄继武
吴晓云
胡军全
古志雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
National Sun Yat Sen University
Original Assignee
National Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Sun Yat Sen University filed Critical National Sun Yat Sen University
Priority to CN 200510033657 priority Critical patent/CN1664849A/en
Publication of CN1664849A publication Critical patent/CN1664849A/en
Pending legal-status Critical Current

Links

Images

Abstract

This invention relates to an image identifying technology based on parameter integer wavelet change belonging to multimedia information safety region, which comprises the following steps: first, pre-processing original watermark in double-value format to equalize the ratio of 0 and 1; then, adopting lift lattice parameter integer wavelet to decomposing image data and embedding watermark in changed low-frequency factor; last acquiring image data with watermark through wavelet change. The invention can by identifying validity and integrity of image spreading by network, assure the confidence level of image's transmission and issuance.

Description

Image authentication method based on parameter integer wavelet transformation
Technical field
The present invention is a kind of image authentication technology based on parameter integer wavelet transformation, belongs to the multi-media signal security fields.
Background technology
Digital media (digital picture, digital video, DAB general designation) bringing ultimate attainment audiovisual to enjoy love to people when, also exists weakness: by existing multimedia treatment technology, its content can be modified easily or be synthetic.Because these are by still only wonderful only Xiao of Digital Media after distorting, human eye can not discovered the vestige behind a bit manual amendment, and this just gives heavy strike of author of medium inevitably: the works that work laboriously to create just become other people achievement in seconds.Confirm that whether these Digital Medias are distorted, and need authenticate them.
Traditional authentication techniques based on digital signature (Digital Signature) are carrying out having following deficiency when Digital Media authenticates: 1) efficient is not high; 2) digital signature information and image information binding, vulnerable; 3) can't positioning tampering.This makes becomes new research focus based on fragile watermark Digital Media authentication techniques.Fragile watermark is to any variation sensitivity that adds all in image.Whether, truly whether and whether complete existence by detecting embed watermark guarantee the confidence level of original image.In general, fragile watermark need satisfy following three basic demands: the 1) high susceptibility to distorting; 2) invisibility; 3) security.Fragile watermark can be divided into complete fragile watermark and semi-fragile watermarking again.Fragile watermark does not allow its carrier that a bit variation is arranged fully, and semi-fragile watermarking then allows its carrier can carry out the operation that keeps such as contents such as JPEG lossy compression method, the malice of destroying its content is distorted then very responsive.In actual applications, semi-fragile watermarking has more wide application prospect than complete fragile watermark.
The research of fragile watermark mainly concentrates on the image field at present.Its technology can be divided into two classes: spatial domain technology and transform domain technology.The former comes embed watermark by direct modification image pixel value.The conversion coefficient that the latter then chooses after the image transformation carries out the watermark embedding.Because wavelet transform DWT (Discrete Wavelet Transform) has when good-frequency localization property and be complementary with human visual system HVS (Human Visual System), make it in Joint Photographic Experts Group JPEG2000 of new generation, occupy core position, and replace discrete cosine transform DCT (Discrete CosineTransform) to become the main tool of transform domain digital watermarking algorithm gradually.
In the existing fragile watermark scheme based on traditional DWT, conversion all is to adopt same wavelet basis, if the algorithm victim knows that then original watermark information might illegally be recovered, thereby can carry out multiple attack.In addition, not high based on the watermarking algorithm efficient of traditional DWT, can not satisfy the needs of real system.
Summary of the invention
The objective of the invention is to propose a kind of semi-fragile watermarking technology of the parameter integer wavelet transformation based on Via Lifting Scheme, be used to carry out the authenticity and integrity authentication of digital media data, guarantee the confidence level of media data.
To achieve these goals, the inventive method adopts following four processes:
1) binary watermarking pre-service is with two-value original watermark and two-value pseudo random matrix XOR mutually, the watermark that produces 0 and 1 balanced proportion;
2) structure is based on the parameter integer small echo of Via Lifting Scheme;
3) embed watermark adopts the parameter integer small echo that step 2 constructed that view data is carried out wavelet decomposition, and watermark is embedded in the low frequency sub-band coefficient behind the wavelet transformation;
4) distort detection and authentication, the classifying rules of distorting of its foundation is: (1) is if the nothing modification is then thought in λ=0; (2) as if λ>0, and η<τ, then think accidental modification; (3) if η 〉=τ then thinks malicious attack.λ wherein, η be respectively distort detect erroneous point and distort detect be in the erroneous point densely distributed have a few in shared ratio, τ is the real number between predefined 0.5 to 1, generally is taken as 0.55.
Distort when detecting and authenticating,, the type whether view data to be certified is distorted and distorted is made Comprehensive Assessment in conjunction with subjective evaluation and objective evaluation.Subjective evaluation is by eye-observation watermark differential chart, realizes distorting the preliminary judge of detection.Objective evaluation then is according to certain rule, according to distorting classifying rules, makes assessment to distorting type.
Compare with existing fragile watermark technology, the present invention has following advantage:
Wavelet basis when 1) selecting medium to carry out wavelet transformation via parameter has solved medium when carrying out traditional wavelet, the changeless shortcoming of wavelet basis, and security is than the watermarking project height based on traditional wavelet.
2) adopt Via Lifting Scheme to realize integer wavelet transformation, make the watermark authentication scheme more at a high speed with efficiently.
3) in conjunction with subjectivity and objective evaluation, the accuracy of distinguishing accidental modification and malicious attack is improved.
4) can resist quality factor and be low to moderate 40% JPEG (Joint Photograph Coding Experts Group) lossy compression method.
Below we illustrate effect of the present invention from theoretical and experimental data.
1) binary watermarking pre-service
Binary watermarking that the present invention adopts embeds for convenience because wherein 0 and 1 ratio gap is bigger, must carry out pre-service to original watermark.By with the pseudo random matrix of binary watermarking and two-value XOR mutually, can reach the purpose of balanced 0 and 1 ratio.
2) based on the structure of the parameter integer small echo of Via Lifting Scheme
Adopt Via Lifting Scheme to decompose original signal and can divide three steps: cut apart, predict, upgrade.We can construct parameterized integer wavelet by Via Lifting Scheme.For one-dimensional signal { x l} L ∈ Z, be example with 9/7 biorthogonal wavelet, its parameterized integer wavelet transformation based on Via Lifting Scheme is:
s l ( 0 ) = x 2 l d l ( 0 ) = x 2 l + 1 , d l ( 1 ) = d l ( 0 ) + Int ( α ( s l ( 0 ) + s l + 1 ( 0 ) ) ) s l ( 1 ) = s l ( 0 ) + Int ( β ( d l ( 1 ) + d l - 1 ( 0 ) ) ) ,
d l ( 2 ) = d l ( 1 ) + Int ( γ ( s l ( 1 ) + s l + 1 ( 1 ) ) ) s l ( 2 ) = s l ( 1 ) + Int ( δ ( d l ( 2 ) + d l - 1 ( 2 ) ) ) ,
d l ( 3 ) = d l ( 2 ) + Int ( ( ζ - ζ 2 ) s l ( 2 ) ) s l ( 3 ) = s l ( 2 ) + Int ( ( - 1 / ζ ) d l ( 3 ) ) , d l ( 4 ) = d l ( 3 ) + Int ( ( ζ - 1 ) s l ( 3 ) ) s l ( 4 ) = s l ( 3 ) + d l ( 4 ) , s l = s l ( 4 ) d l = d l ( 4 ) - - - - ( 1 )
S wherein lAnd d lBe respectively low frequency and high fdrequency component, S (l) l, d (i) l(i=0,1,2) is intermediate result, and Int (x) is a bracket function.The relation of parameter beta, γ, δ ζ and α is as follows:
β = - 1 4 ( 1 + 2 α ) 2 γ = - 1 - 4 α - 4 α 2 1 + 4 α δ = 1 16 ( 4 - 2 + 4 α ( 1 + 2 α ) 4 + 1 - 8 α ( 1 + 2 α ) 2 ) ζ = 2 2 ( 1 + 2 α ) 1 + 4 α - - - - ( 2 )
Restructuring procedure then is the inverse process of said process.For 2D signal, then decompose earlier to be listed as again to decompose and obtain wavelet decomposition figure, during reconstruct then earlier in column direction reconstruct, then in line direction reconstruct.
3) embed watermark
Original image is carried out wavelet decomposition, and the coefficient of keeping the score after separating is f, to the subband wavelet coefficient of embed watermark, finishes the embedding of watermark by following formula.
When watermark is " 0 ", embed as follows:
f * ( i , j ) = R _ LFB ( f ( i , j ) - 01000 b , 11000 b ) C _ LFB ( f ( i , j ) ) ≤ 01000 b R _ LFB ( f ( i , j ) , 11000 b ) otherwise
When watermark is " 1 ", embed as follows:
f * ( i , j ) = R _ LFB ( f ( i , j ) + 10000 b , 01000 b ) C _ LFB ( f ( i , j ) ) ≥ 11000 b R _ LFB ( f ( i , j ) , 01000 b ) otherwise
Wherein, minimum five of C_LFB (a) expression number a, (a, b) expression replaces among the number a minimum five with number b to R_LFB.
4) watermark extracting
The same with the watermark embedding, at first testing image is carried out wavelet decomposition, the coefficient of keeping the score after separating is that (i j), equally, for the subband wavelet coefficient of embed watermark, calculates f '
w * ′ ( i , j ) = 1 LFB ( f ′ ( i , j ) ) = 0 0 LFB ( f ′ ( i , j ) ) = 1
Here minimum the 5th of LFB (a) expression coefficient a, and the final watermark bit information of extracting is
w′(i,j)=w *′(i,j)p n(i,j)
P wherein n(i, an element in the two-value pseudo random matrix that is produced when j) being watermark pretreatment.
5) distort detection and verification process
Make w ' (i, j) watermark for extracting.The watermark differential chart is
D(i,j)=|w(i,j)-w′(i,j)|
In conjunction with subjective evaluation and objective evaluation, we can judge distorting type.
Subjective evaluation is according to the watermark differential chart, relies on human visual observation, and then the type of whether being distorted and distorting is belonged to accidental attacks or judgement is made in malicious attack.
Objective evaluation be a kind of quantized distort evaluating method.At first need the low frequency sub-band that watermark embeds is done as giving a definition:
Dense point: (i is dense to be meant that its eight close on picture element and have at least one to be to detect erroneous point j) to current watermark detection erroneous point x.
Sparse point: (i is sparse be meant eight to close on the picture element neither one be to detect erroneous point j) to current watermark detection erroneous point x.
Area={ low frequency sub-band picture element sum }; Area , dense={ dense some number }; Area Sparse={ sparse some number };
area total=area dense+area sparse λ = area total area ; η = area dense area total ;
Be defined as follows judgment criterion again:
(1) λ=0 does not then have modification.
(2) as if λ>0, and η<τ, think accidental modification so.α is a real number of getting in advance between fixed 0.5 to 1.
(3) η 〉=τ then thinks malicious attack.
Make authentication result at last, do not revise or accidental the modification if having, image then to be checked is true; If malicious attack, image then to be checked is false.
Description of drawings
The invisibility image of Fig. 1 watermark.Wherein (a) is original image; (b) be the watermarking images (PSNR=42.26dB) of α=-1.5 for embedding parameter.
Fig. 2 detects and the station-keeping ability test pattern for distorting.Wherein (a) is for distorting figure (hair highlight); (b) be watermark extracting figure; (c) be the watermark error image.
Fig. 3 is the watermark extracting figure after the watermarking images lease making different quality factor JPEG compression.Wherein the quality factor of (a) is 60%; (b) quality factor is 50%; (c) quality factor is 40%.
Fig. 4 embeds parameter and the extracting parameter watermark extracting figure when identical or different.Wherein (a) is for embedding the watermarking images that contains of parameter alpha=-1.5; (b) be the watermark extracting figure of extracting parameter α=-1.5; (c) be the watermark extracting figure of extracting parameter α=-1.5000001.
Visible watermark image and original image visually do not have difference among Fig. 1.
Fig. 2 can find out that present technique is the positioning tampering zone accurately.
Fig. 3 as seen, technology described herein can be resisted the quality factor and is low to moderate 40% JPEG compression.
Can see among Fig. 4 that extracting parameter is with respect to the minor variations of embedding parameter, meeting is so that the watermark that extracts is assorted Disorderly no chapter distributes, and this illustrates with other parameter, also can not obtain even the minimum parameter of difference is carried out watermark extracting Get useful information.

Claims (2)

1, a kind of image authentication method based on parameter integer wavelet transformation is characterized in that this method is made up of four steps
1) binary watermarking pre-service is with two-value original watermark and two-value pseudo random matrix XOR mutually, the watermark that produces 0 and 1 balanced proportion;
2) structure is based on the parameter integer small echo of Via Lifting Scheme;
3) embed watermark adopts the parameter integer small echo that step 2 constructed that view data is carried out wavelet decomposition, and watermark is embedded in the low frequency sub-band coefficient behind the wavelet transformation;
4) distort detection and authentication, the classifying rules of distorting of its foundation is: (1) is if the nothing modification is then thought in λ=0; (2) as if λ>0, and δ<α, then think accidental modification; (3) if δ 〉=α then thinks malicious attack.λ wherein, δ be respectively distort detect erroneous point and distort detect be in the erroneous point densely distributed have a few in shared ratio, α is the real number between predefined 0.5 to 1.
2, a kind of image authentication method based on parameter integer wavelet transformation as claimed in claim 1 is characterized in that the α of step 4) gets real number 0.55.
CN 200510033657 2005-03-23 2005-03-23 Image identification method based on parameter integer wavelet transformation Pending CN1664849A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200510033657 CN1664849A (en) 2005-03-23 2005-03-23 Image identification method based on parameter integer wavelet transformation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200510033657 CN1664849A (en) 2005-03-23 2005-03-23 Image identification method based on parameter integer wavelet transformation

Publications (1)

Publication Number Publication Date
CN1664849A true CN1664849A (en) 2005-09-07

Family

ID=35035931

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200510033657 Pending CN1664849A (en) 2005-03-23 2005-03-23 Image identification method based on parameter integer wavelet transformation

Country Status (1)

Country Link
CN (1) CN1664849A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100419790C (en) * 2006-09-30 2008-09-17 中山大学 Data decomposition and reconfiguration method with parameter
CN103049882A (en) * 2012-12-22 2013-04-17 浙江工业大学 Virtual one-dimensional barcode-based image watermark embedding and detecting method
CN112991345A (en) * 2021-05-11 2021-06-18 腾讯科技(深圳)有限公司 Image authenticity detection method and device, computer equipment and storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100419790C (en) * 2006-09-30 2008-09-17 中山大学 Data decomposition and reconfiguration method with parameter
CN103049882A (en) * 2012-12-22 2013-04-17 浙江工业大学 Virtual one-dimensional barcode-based image watermark embedding and detecting method
CN103049882B (en) * 2012-12-22 2016-04-13 浙江工业大学 Image watermark based on virtual bar code embeds and detection method
CN112991345A (en) * 2021-05-11 2021-06-18 腾讯科技(深圳)有限公司 Image authenticity detection method and device, computer equipment and storage medium
CN112991345B (en) * 2021-05-11 2021-08-10 腾讯科技(深圳)有限公司 Image authenticity detection method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
Luo et al. JPEG error analysis and its applications to digital image forensics
CN100394443C (en) Reversible watermark method for image certification
CN1941693A (en) Method for watermarking small wave threshold digital audio multiple mesh based on blind source separation
Khan et al. Robust method for detection of copy-move forgery in digital images
Qadir et al. Estimating JPEG2000 compression for image forensics using Benford's Law
CN101038661A (en) Blind watermark embedding and abstracting method based on regression support vector machine
Vasudev A review on digital image watermarking and its techniques
CN1315091C (en) Digital image recognising method based on characteristics
CN1664849A (en) Image identification method based on parameter integer wavelet transformation
CN1246779C (en) Embedding and extracting method for wavelet domain chaotic semi-frageile digit water print
Susanto et al. A robust non-blind image watermarking method using 2-level HWT-DCT
Qin et al. Effective fragile watermarking for image authentication with high-quality recovery capability
CN1234230C (en) Vulnerable watermark method for protecting electronic signet
Tiwari et al. A chaotic encrypted reliable image watermarking scheme based on integer wavelet transform-Schur transform and singular value decomposition
Senthil et al. Digital image watermarking using edge detection and wavelets with robustness analysis against jpeg compression attacks
Varghese et al. A Hybrid Digital Image Watermarking Scheme Incorporating DWT, DFT, DCT and SVD Transformations
Shukla et al. Video watermarking using dyadic filter and discrete wavelet transform
CN1889672A (en) Video-frequency identifying method based on small wave conversion and mixed watermark
CN100340111C (en) Medical image fragile watermark method based on wavelet transform
Song et al. A New Watermarking Frame Based on the Genetic Algorithms and Wavelet Packet Decomposition.
Mishra et al. An easy yet effective method for detecting spatial domain LSB steganography
Patvardhan et al. A robust wavelet packet based blind digital image watermarking using HVS characteristics
Rhayma et al. Self-authentication scheme based on semi-fragile watermarking and perceptual hash function
Shaizad et al. Watermarking technique to enhance image security in cloud computing
Nanjundan et al. A Novel Steganographic Approach for Image Encryption Using Watermarking

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication