[go: up one dir, main page]

CN102103738B - Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks - Google Patents

Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks Download PDF

Info

Publication number
CN102103738B
CN102103738B CN2011100528292A CN201110052829A CN102103738B CN 102103738 B CN102103738 B CN 102103738B CN 2011100528292 A CN2011100528292 A CN 2011100528292A CN 201110052829 A CN201110052829 A CN 201110052829A CN 102103738 B CN102103738 B CN 102103738B
Authority
CN
China
Prior art keywords
image
block
image block
watermark
recovery
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2011100528292A
Other languages
Chinese (zh)
Other versions
CN102103738A (en
Inventor
和红杰
陈帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southwest Jiaotong University
Original Assignee
Southwest Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southwest Jiaotong University filed Critical Southwest Jiaotong University
Priority to CN2011100528292A priority Critical patent/CN102103738B/en
Publication of CN102103738A publication Critical patent/CN102103738A/en
Application granted granted Critical
Publication of CN102103738B publication Critical patent/CN102103738B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

一种数字图像篡改内容可恢复的变容量水印的生成与认证方法,将2×2的图像块分为平滑图像块和非平滑图像块,平滑图像块提取6比特特征,非平滑图像块提取12比特特征,将图像块特征加密后生成图像块恢复水印并随机嵌入其他图像块中,通过比较图像块特征的一致性并结合块邻域特性判定其真实性。对判定为篡改的图像块,根据其相应恢复水印是否被篡改分两步执行不同篡改恢复操作以提高篡改恢复质量。本发明根据图像块自身特性生成变容量恢复水印,且恢复水印同时用于篡改定位和篡改恢复,在保证足够图像特征的同时降低了水印嵌入容量,兼顾了含水印图像质量和篡改恢复质量;同时提高了安全性,能抵抗拼贴攻击、均值攻击等已知伪造攻击。

Figure 201110052829

A variable-capacity watermark generation and authentication method with recoverable digital image tampering content. A 2×2 image block is divided into a smooth image block and a non-smooth image block. The smooth image block extracts 6-bit features, and the non-smooth image block extracts 12 bits. Bit features, encrypting image block features to generate image block recovery watermarks and randomly embedding them into other image blocks, and judging its authenticity by comparing the consistency of image block features and combining block neighborhood characteristics. For image blocks judged to be tampered, different tampering recovery operations are performed in two steps according to whether the corresponding recovery watermark has been tampered with to improve the quality of tampering recovery. The present invention generates a variable-capacity recovery watermark according to the characteristics of the image block itself, and the recovery watermark is used for tampering location and tampering recovery at the same time, while ensuring sufficient image features, the watermark embedding capacity is reduced, and the quality of the watermarked image and the quality of tampering recovery are taken into account; at the same time It improves security and can resist known forgery attacks such as collage attack and mean attack.

Figure 201110052829

Description

数字图像篡改内容可恢复的变容量水印生成与认证方法Generation and authentication method of variable capacity watermark with recoverable digital image tampering content

技术领域 technical field

本发明涉及一种字图像篡改内容可恢复的认证水印的生成与认证方法,用于检测数字图像的真实性和完整性,并对被篡改图像进行恢复。  The invention relates to a generation and authentication method of an authentication watermark whose tampered content of a word image can be recovered, which is used for detecting the authenticity and integrity of a digital image and recovering the tampered image. the

背景技术 Background technique

随着计算机、数码成像和网络通信技术发展,数字图像成为人们获取与交换信息的主要来源和信息传播重要载体之一。图像的数字化存储和各种图像处理软件的出现使数字图像的编辑、修改和合成变得十分简单。数字图像处理技术提高了图像的显示质量,但篡改和伪造图像如被用于新闻媒体、法庭证据、科学发现等领域,会对社会的诚信、政府的公信力和科学的真实性等带来严重的负面影响。因此,如何检测和鉴别数字图像的真实性和完整性已成为国内外近年来前沿性研究课题,不仅具有重要的学术价值,更具有重要的社会意义和广泛的应用前景。  With the development of computer, digital imaging and network communication technology, digital image has become the main source for people to obtain and exchange information and one of the important carriers of information dissemination. The digital storage of images and the emergence of various image processing software make the editing, modification and synthesis of digital images very simple. Digital image processing technology has improved the display quality of images, but tampering and forgery of images, if used in news media, court evidence, scientific discoveries, etc., will bring serious damage to the integrity of the society, the credibility of the government, and the authenticity of science. Negative impact. Therefore, how to detect and identify the authenticity and integrity of digital images has become a frontier research topic at home and abroad in recent years. It not only has important academic value, but also has important social significance and broad application prospects. the

可恢复水印不仅能检测和鉴别数字图像的真实性和完整性,而且能近似恢复篡改区域的原始内容。“篡改恢复”为认证数字水印提出了更高的要求,如何提高恢复图像质量是可恢复水印研究的重要目标。数字图像可恢复水印算法首先将图像分为大小相同的图像块以实现篡改定位,根据图像块特征生成的恢复水印不是嵌入在图像块自身,而是基于密钥嵌入在其它图像块中。这种处理减小了图像块与其恢复水印同时被篡改的可能性,有利于篡改块的恢复,但使篡改检测变得相对困难。可恢复水印算法的篡改定位性能直接影响篡改恢复质量,这是因为:如果篡改未被检测到,或者真实图像被误判为篡改,将导致恢复图像中存在篡改得不到恢复或真实图像被错误恢复。为解决可恢复水印的篡改定位问题,Lin等(P.-L.Lin,C.-K.Hsieh,P.-W.Huang.A hierarchical digital watermarking method for image tamper detection and recovery,Pattern Recognition,2005,38(12):2519-2529)提出为每个图像块附加2比特认证水印以检测图像块的真实性。然而由于认证水印是块独立的,导致认证水印不能抵抗拼贴攻击。也就是说,假设利用相同密钥生成大小相同的两幅含水印图像 Y1和Y2,用Y1中图像块替换Y2中相应位置的图像块,认证水印不能检测该篡改。即使将每个图像块的认证水印比特增加至32比特,如Qian等人提出的具有高质量恢复能力的自嵌入水印算法(Z.Qian,G.Feng,X.Zhang,S.Wang.Image self-embedding with high-quaility restoration capability,Digital Signal Processing,2011(21):278-286),附加认证水印仍然不能抵抗拼贴攻击。而且,附加认证水印增加了水印嵌入容量,也会使含水印图像质量降低。  Restorable watermarking can not only detect and identify the authenticity and integrity of digital images, but also approximate the original content of tampered areas. "Tamper recovery" puts forward higher requirements for authentic digital watermarking, how to improve the quality of recovered images is an important goal of recoverable watermarking research. The digital image recoverable watermarking algorithm first divides the image into image blocks of the same size to realize tampering location, and the recovery watermark generated according to the characteristics of the image block is not embedded in the image block itself, but embedded in other image blocks based on the key. This processing reduces the possibility of the image block being tampered with while restoring the watermark, which is beneficial to the restoration of the tampered block, but makes tampering detection relatively difficult. The tamper localization performance of the recoverable watermarking algorithm directly affects the quality of tamper recovery, because: if the tamper is not detected, or the real image is misjudged as tampered, it will cause the tampering in the restored image to be unrecovered or the real image will be wrongly detected. recover. In order to solve the tamper localization problem of recoverable watermark, Lin et al. , 38(12):2519-2529) proposed to attach a 2-bit authentication watermark to each image block to detect the authenticity of the image block. However, since the authentication watermark is block-independent, the authentication watermark cannot resist collage attack. That is to say, assuming that the same key is used to generate two watermarked images Y1 and Y2 of the same size, and the corresponding image block in Y2 is replaced by the image block in Y1, the authentication watermark cannot detect the tampering. Even if the authentication watermarking bits of each image block are increased to 32 bits, the self-embedded watermarking algorithm with high-quality recovery ability proposed by Qian et al. -embedding with high-quaility restoration capability, Digital Signal Processing, 2011(21): 278-286), the additional authentication watermark still cannot resist collage attack. Moreover, the additional authentication watermark increases the watermark embedding capacity, and also degrades the quality of the watermarked image. the

此外,恢复水印生成方法是影响定位精度、篡改恢复质量和安全性的重要因素。现有生成恢复水印最常用的方法有两种:①8×8图像块重要DCT(离散余弦变换)系数的量化编码,其缺点是定位精度较低。②2×2图像块的平均值,定位精度高,但易受恒均值攻击且对非平滑图像块的恢复质量欠佳。对利用2×2块均值生成恢复水印的算法中,假设两个图像块B1=(30,30,30,30)和B2=(1,1,59,59),它们的平均值相同,均为30。因此它们的恢复水印也相同。如果用图像块B1替换块B2,通过比较恢复水印检测块真实性的恢复水印算法不能检测该篡改(即不能抵抗恒均值攻击),而利用附加认证水印检测块真实性的算法也得不到好的恢复质量。这是因为相应恢复水印仅能重构B2的均值特征,而无法重构B2的纹理特征。  In addition, the recovery watermark generation method is an important factor affecting the positioning accuracy, tamper recovery quality and security. There are two most commonly used methods for generating and restoring watermarks: ① Quantization and encoding of important DCT (discrete cosine transform) coefficients of 8×8 image blocks, the disadvantage of which is low positioning accuracy. ② The average value of 2×2 image blocks has high positioning accuracy, but it is vulnerable to constant average attack and the recovery quality of non-smooth image blocks is not good. In the algorithm for generating a restored watermark using the average value of 2×2 blocks, assuming two image blocks B1=(30, 30, 30, 30) and B2=(1, 1, 59, 59), their average values are the same, and both for 30. So their recovered watermarks are also the same. If block B2 is replaced by image block B1, the recovery watermarking algorithm that detects the authenticity of the block by comparing the recovered watermark cannot detect this tampering (i.e., cannot resist the constant-mean attack), and the algorithm that detects the authenticity of the block using an additional authentication watermark will not be good. recovery quality. This is because the corresponding restoration of the watermark can only reconstruct the mean feature of B2, but not the texture feature of B2. the

如果图像块恢复水印除了保存图像块的均值特征外,还保存有图像块的纹理特征,则算法的恢复质量和抵抗恒均值攻击的能力都会得到提高。但保存图像块的文理特征会增加水印容量,而且对类似于B1这样的平滑块增加纹理特征是多余的。  If the image block restoration watermark saves the texture feature of the image block in addition to the mean value feature of the image block, the restoration quality of the algorithm and the ability to resist the constant mean value attack will be improved. But saving the textural features of the image block will increase the watermark capacity, and adding texture features to smooth blocks like B1 is redundant. the

发明内容 Contents of the invention

本发明解决其技术问题,所采用的技术方案为:一种数字图像篡改内容可恢复的变容量水印生成与认证方法,包括如下步骤:  The present invention solves the technical problem, and the adopted technical solution is: a variable-capacity watermark generation and authentication method with recoverable content of digital image tampering, including the following steps:

A、水印生成与嵌入  A. Watermark generation and embedding

A1、图像分块并分类:将大小为2m×2n的原始图像X分为m×n个互不重叠的2×2图像块Xi={xi1,xi2,xi3,xi4},其中,i为图像块编号,i=1,2,...,N,N=m×n为图像块个数;并根据图像块内容将图像块分为平滑图像块和非平滑图像块两类;  A1. Image segmentation and classification: Divide the original image X with a size of 2m×2n into m×n non-overlapping 2×2 image blocks X i ={ xi1 , xi2 , xi3 , xi4 }, Wherein, i is the image block number, i=1, 2,..., N, N=m×n is the number of image blocks; and the image blocks are divided into smooth image blocks and non-smooth image blocks according to the content of the image blocks kind;

A2、伪随机序列与块链生成:基于用户密钥Key生成长度为N的实值伪随机序列R={ri|i=1,2,...,N},由R的索引有序序列生成块链{(Xi,Xi′)|i,i′∈[1,N]},i′为R索引有序序列中第i个元素的值,Xi’为Xi的映射块;  A2. Pseudo-random sequence and block chain generation: Generate a real-valued pseudo-random sequence of length N based on the user key Key R={r i |i=1, 2,...,N}, ordered by the index of R Sequence generation block chain {(X i ,X i′ )|i, i′∈[1,N]}, i′ is the value of the i-th element in the R index ordered sequence, and X i’ is the mapping of X i piece;

A3、变容量特征提取:对每个图像块Xi计算生成v比特块特征Fi={fi1,fi2,...,fiv}。其中,fi2~fi6为图像块Xi高5位平均值的5位二进制编码,如果图像块Xi为平滑图像块,则v=6且fi1=0,否则v=12,fi1=1,fi7~fi12为非平滑图像块的细节编码;  A3. Variable capacity feature extraction: calculate and generate v-bit block feature F i ={f i1 , f i2 , . . . , f iv } for each image block X i . Among them, f i2 ~ f i6 is the 5-bit binary code of the average value of the upper 5 bits of the image block Xi , if the image block Xi is a smooth image block, then v=6 and f i1 =0, otherwise v=12, f i1 =1, f i7 ~ f i12 are the detail coding of the non-smooth image block;

A4、变容量水印生成:利用伪随机序列R的第i个随机数ri生成二值伪随机序列Bi={bij|j=1,2,...12},加密图像块特征Fi={fi1,fi2,...,fiv}生成恢复水印Wi={wi1,wi2,...,wiv},  A4. Variable-capacity watermark generation: use the i-th random number r i of the pseudo-random sequence R to generate a binary pseudo-random sequence B i ={b ij |j=1, 2,...12}, and encrypt image block features F i = {f i1 , f i2 , ..., f iv } generate restored watermark W i = {w i1 , w i2 , ..., w iv },

ww ijij == ff ijij ⊕⊕ bb ijij

其中, 

Figure BDA0000048948190000032
为异或操作;对平滑图像块bij的下标j取值范围为1~6,对非平滑图像块bij的下标j取值范围为1~12;  in,
Figure BDA0000048948190000032
is an XOR operation; the value range of subscript j for smooth image block b ij is 1-6, and the value range of subscript j for non-smooth image block b ij is 1-12;

A5、变容量水印嵌入:把图像块Xi的恢复水印Wi嵌入其映射块Xi’的低有效位生成含水印图像块Yi’,  A5 . Variable-capacity watermark embedding: Embed the restored watermark W i of the image block Xi into the least significant bit of its mapping block Xi ' to generate a watermarked image block Y i' ,

如果Xi为非平滑图像块,  If Xi is a non-smooth image block,

Figure BDA0000048948190000033
Figure BDA0000048948190000033

如果Xi为平滑图像块,  If Xi is a smooth image block,

Figure BDA0000048948190000034
Figure BDA0000048948190000034

B、水印提取与比较  B. Watermark extraction and comparison

B1、分块、伪随机序列和块链生成:Y*是含水印图像Y传输后接收到的被测图像,按A1步操作把Y*分为2×2块 

Figure BDA0000048948190000035
再按A2步相同的操作和密钥Key生成随机序列R和块链 
Figure BDA0000048948190000036
B1. Blocking, pseudo-random sequence and block chain generation: Y * is the tested image received after the watermarked image Y is transmitted, and Y * is divided into 2×2 blocks according to step A1
Figure BDA0000048948190000035
Then follow the same operation and key Key in step A2 to generate random sequence R and block chain
Figure BDA0000048948190000036

B2、块特征计算与重构:对每个被测图像块 

Figure BDA0000048948190000037
按A3步操作计算出图像块特征 
Figure BDA0000048948190000038
同时根据从其映射图像块 
Figure BDA0000048948190000039
低有效位提取恢复水印 
Figure BDA00000489481900000310
重构出块特征 
Figure BDA00000489481900000311
B2. Block feature calculation and reconstruction: for each tested image block
Figure BDA0000048948190000037
Calculate the image block features according to the A3 step operation
Figure BDA0000048948190000038
while mapping image blocks according to
Figure BDA0000048948190000039
Least Significant Bit Extraction and Restoration of Watermark
Figure BDA00000489481900000310
Refactor block feature
Figure BDA00000489481900000311

Ff ii LL == WW ii ** ⊕⊕ BB ii

其中,Bi为基于ri生成的长度为12的二值伪随机序列,从其映射图像块 

Figure BDA0000048948190000042
低位提取水印信息 
Figure BDA0000048948190000043
按以下公式得到,  Among them, B i is a binary pseudo-random sequence of length 12 generated based on r i , from which the image block is mapped
Figure BDA0000048948190000042
Low bit extraction watermark information
Figure BDA0000048948190000043
According to the following formula,

Figure BDA0000048948190000044
Figure BDA0000048948190000044

B3、分类特征比较:比较被测图像块 

Figure BDA0000048948190000045
高位计算得到的块特征 
Figure BDA0000048948190000046
和从其映射块 
Figure BDA0000048948190000047
低有效位提取恢复水印重构的块特征 按下列公式生成比较矩D={di|i=1,2,...,N},  B3. Classification feature comparison: compare the tested image blocks
Figure BDA0000048948190000045
Block characteristics obtained by high-level calculation
Figure BDA0000048948190000046
and map blocks from it
Figure BDA0000048948190000047
Extraction of Least Significant Bits to Recover Block Features of Watermark Reconstruction Generate comparative moment D={d i |i=1, 2,..., N} according to the following formula,

Figure BDA0000048948190000049
Figure BDA0000048948190000049

其中 c = 6 ( 1 + f i 1 * ) ; in c = 6 ( 1 + f i 1 * ) ;

C、篡改检测  C. Tamper detection

C1、计算生成比较矩阵D的邻域特征矩阵Δ={δi|i=1,2,...,N},  C1. Calculate and generate the neighborhood characteristic matrix Δ={δ i |i=1, 2, ..., N} of the comparison matrix D,

δi=∑dj,j=i±1,i±n,i+n±1,i-n±1  δ i =∑d j , j=i±1, i±n, i+n±1, in±1

C2、根据比较矩阵D和及其邻域特征矩阵Δ,生成初态篡改检测矩阵T0 T 0 = ( t i 0 | i = 1,2 , . . . , N ) , C2. According to the comparison matrix D and its neighborhood feature matrix Δ, generate the initial state tampering detection matrix T 0 T 0 = ( t i 0 | i = 1,2 , . . . , N ) ,

Figure BDA00000489481900000412
Figure BDA00000489481900000412

C3、根据C2步生成的初态篡改检测矩阵T0生成篡改检测矩阵T,  C3. Generate a tampering detection matrix T according to the initial state tampering detection matrix T0 generated in the C2 step,

Figure BDA00000489481900000413
Figure BDA00000489481900000413

其中 j=i±1,i±n,i±n±1。ti=1表示被测图像块 被篡改,ti=0表示被测图像块 

Figure BDA00000489481900000416
是真实的;  in j=i±1, i±n, i±n±1. t i =1 means the image block under test tampered, t i =0 means the image block under test
Figure BDA00000489481900000416
It is true;

D、篡改恢复  D. Tamper recovery

如果T中元素不全为0,表明被测图像中存在篡改图像块,则对被测图像依次执行以下两步得到篡改恢复图像YR;  If the elements in T are not all 0, it indicates that there is a tampered image block in the tested image, then perform the following two steps in turn on the tested image to obtain the tampered recovery image Y R ;

D1、特征恢复:对判定为篡改的图像块 

Figure BDA0000048948190000051
如果其映射块Yi’ *是真实的,用B2步重构块特征 对 
Figure BDA0000048948190000053
进行恢复,  D1. Feature recovery: For image blocks judged to be tampered
Figure BDA0000048948190000051
If its mapped block Y i' * is real, reconstruct block features with B2 step right
Figure BDA0000048948190000053
to restore,

Figure BDA0000048948190000054
Figure BDA0000048948190000054

其中,Γ-1()为图像块特征编码函数的反函数;同时生成标示矩阵L,用以标记没有被恢复的篡改块,  Among them, Γ -1 () is the inverse function of the feature encoding function of the image block; at the same time, a label matrix L is generated to mark the tampered block that has not been restored,

Figure BDA0000048948190000055
Figure BDA0000048948190000055

D2、邻域恢复:如果L中元素不全为0,对li=1对应图像块 

Figure BDA0000048948190000056
利用与其相邻12个像素中的有效像素均值修正图像块 
Figure BDA0000048948190000057
中的每一个像素的值。  D2. Neighborhood recovery: if the elements in L are not all 0, the image block corresponding to l i =1
Figure BDA0000048948190000056
Correct the image block by using the mean value of the effective pixels in the 12 adjacent pixels
Figure BDA0000048948190000057
The value of each pixel in .

与现有技术相比,本发明的有益效果是:  Compared with prior art, the beneficial effect of the present invention is:

1、特征容量可变:本发明基于图像块内容提取不等长块特征——平滑图像块6比特,非平滑图像块12比特,以自适应地生成变容量恢复水印,在保证能够高质量恢复篡改图像块和抵抗恒均值攻击的同时,使提取的特征容量达到最少。  1. Variable feature capacity: the present invention extracts block features of unequal length based on image block content—6 bits for smooth image blocks and 12 bits for non-smooth image blocks, so as to adaptively generate variable-capacity restoration watermarks, ensuring high-quality restoration While tampering with image blocks and resisting constant mean attack, the extracted feature capacity is minimized. the

2、恢复水印容量可变:恢复水印生成时不增加任何冗余信息,对两种不同长度(6和12比特)的块特征加密生成与其等长的恢复水印,恢复水印生成时不增加任何冗余信息,并采用不同方法将变容量恢复水印嵌入其它图像块中。在完全保留图像块特征的同时,使嵌入恢复水印容量达到最少。同时,算法无需增加附加的认证水印,进一步降低了水印嵌入容量,从而提高了含水印数字图像的质量。  2. The capacity of the recovery watermark is variable: no redundant information is added when the recovery watermark is generated, two types of block features with different lengths (6 and 12 bits) are encrypted to generate a recovery watermark of the same length, and no redundant information is added when the recovery watermark is generated. and use different methods to embed the variable-capacity restored watermark into other image blocks. While fully retaining the features of the image block, the capacity of the embedded recovery watermark is minimized. At the same time, the algorithm does not need to add an additional authentication watermark, which further reduces the embedding capacity of the watermark, thereby improving the quality of the watermarked digital image. the

3、恢复水印用于篡改检测:图像块的一致性检测利用了图像块的所有恢复水印——平滑图像块用6比特恢复水印,非平滑图像块用12比特恢复水印。所有恢复水印参与一致性检测,既能提高算法抵抗恒均值攻击和拼贴攻击的能力,也为进一步提高算法的篡改检测性能奠定了基础。  3. Restoration of watermarks for tamper detection: Consistency detection of image blocks utilizes all restoration watermarks of image blocks—6 bits for smooth image blocks and 12 bits for non-smooth image blocks. All restored watermarks participate in consistency detection, which can not only improve the ability of the algorithm to resist constant mean attack and collage attack, but also lay a foundation for further improving the tamper detection performance of the algorithm. the

4、高安全性:首先基于密钥将图像块的特征加密生成恢复水印信息,然后再基于密钥随机嵌入到其它图像块中,并利用嵌入的恢复水印信息检测图像 块的一致性,建立图像块之间的随机相关性。同时,变容量恢复水印保存了图像块尽可能多的特征信息。这些特性使算法能抵抗已知伪造攻击,如拼贴攻击、恒均值攻击等,从而提高了算法的安全性。  4. High security: first encrypt the features of the image block based on the key to generate recovery watermark information, and then randomly embed it into other image blocks based on the key, and use the embedded recovery watermark information to detect the consistency of the image block and establish the image Random dependencies between blocks. At the same time, the variable-capacity restored watermark preserves as much feature information as possible of the image block. These characteristics make the algorithm resistant to known forgery attacks, such as collage attack, constant mean attack, etc., thus improving the security of the algorithm. the

5、高恢复质量:首先,对细节丰富的非平滑图像块采用12比特保存其特征,尽可能多地保留图像块的特征,为提高篡改恢复质量奠定了基础。其次,高的定位精度(2×2像素)和优良的篡改检测性能为提高篡改恢复质量提供了可能。最后,算法中针对不同篡改图像块,分两步执行不同的篡改恢复操作进一步提高了篡改恢复图像的质量。  5. High restoration quality: First, 12 bits are used to save the features of non-smooth image blocks with rich details, so as to preserve as many features of image blocks as possible, laying the foundation for improving the quality of tampering restoration. Second, high localization accuracy (2×2 pixels) and excellent tamper detection performance provide the possibility to improve the quality of tamper recovery. Finally, for different tampered image blocks in the algorithm, different tampering recovery operations are performed in two steps to further improve the quality of the tampering recovery image. the

下面结合实施例对本发明作进一步说明。  The present invention will be further described below in conjunction with embodiment. the

附图说明 Description of drawings

图1为本发明实施例的变容量恢复水印生成与嵌入步骤框图。  Fig. 1 is a block diagram of the steps of generating and embedding a variable capacity restoration watermark according to an embodiment of the present invention. the

图2为本发明实施例非平滑图像块分类及子类编码示意图。  Fig. 2 is a schematic diagram of non-smooth image block classification and subclass encoding according to an embodiment of the present invention. the

图3为一般篡改下本发明与现有的两种可恢复水印算法的性能比较图。  Fig. 3 is a performance comparison diagram between the present invention and two existing recoverable watermarking algorithms under general tampering. the

图4为恒均值攻击下本发明与现有的两种可恢复水印算法的性能比较图。  Fig. 4 is a performance comparison diagram between the present invention and two existing recoverable watermarking algorithms under the constant mean value attack. the

图5为拼贴攻击下本发明与现有的两种可恢复水印算法的性能比较图。  Fig. 5 is a performance comparison diagram between the present invention and two existing recoverable watermarking algorithms under collage attack. the

具体实施方式 Detailed ways

实施例  Example

一种数字图像篡改内容可恢复的变容量水印生成与认证方法,包括水印生成与嵌入、水印提取与比较、篡改检测和篡改恢复四部分。  A variable-capacity watermark generation and authentication method with recoverable tampered content of a digital image, including four parts: watermark generation and embedding, watermark extraction and comparison, tampering detection and tampering recovery. the

A、水印生成与嵌入  A. Watermark generation and embedding

图1是本发明实施例方法中的水印生成与嵌入的具体步骤框图,包括以下五步:  Fig. 1 is a block diagram of specific steps of watermark generation and embedding in the method of the embodiment of the present invention, including the following five steps:

A1、图像分块并分类:将大小为2m×2n的原始图像X分为m×n个互不重叠的2×2图像块Xi={xi1,xi2,xi3,xi4},其中,i为图像块编号,i=1,2,...,N,N=m×n为图像块个数;并根据图像块内容将图像块分为平滑图像块和非平滑图像块两类;  A1. Image segmentation and classification: Divide the original image X with a size of 2m×2n into m×n non-overlapping 2×2 image blocks X i ={ xi1 , xi2 , xi3 , xi4 }, Wherein, i is the image block number, i=1, 2,..., N, N=m×n is the number of image blocks; and the image blocks are divided into smooth image blocks and non-smooth image blocks according to the content of the image blocks kind;

本实施例中图像块分类:对2×2图像块Xi={xi1,xi2,xi3,xi4},如果图像块中两个最大像素与两大最小像素的差不超过h(本例中h=3),则该图像块为平 滑图像块,否则为纹理图像块。  Image block classification in this embodiment: for a 2×2 image block X i ={x i1 , x i2 , x i3 , x i4 }, if the difference between the two largest pixels and the two smallest pixels in the image block does not exceed h( In this example, h=3), the image block is a smooth image block, otherwise it is a texture image block.

实施时,图像块分类采用的两个最大像素与两大最小像素的差h的取值范围通常为2到16,h取值越小,被认为是非平滑图像块的越多,图像的恢复质量越高,但相应嵌入的水印容量越大,会降低含水印图像的质量。反之,平滑图像块越多,相应嵌入的水印容量越小,含水印图像的质量越高,但恢复图像的质量越低。  During implementation, the value of the difference h between the two largest pixels and the two smallest pixels used for image block classification usually ranges from 2 to 16. The smaller the value of h, the more non-smooth image blocks are considered, and the restoration quality of the image The higher the value is, the larger the corresponding embedded watermark capacity will be, which will reduce the quality of the watermarked image. Conversely, the more smooth image blocks, the smaller the capacity of the corresponding embedded watermark, the higher the quality of the watermarked image, but the lower the quality of the restored image. the

A2、伪随机序列与块链生成:基于用户密钥Key生成长度为N的实值伪随机序列R={ri|i=1,2,...,N},由R的索引有序序列生成块链{(Xi,Xi′)|i,i′∈[1,N]},i’为R索引有序序列中第i个元素的值,Xi’为Xi的映射块;  A2. Pseudo-random sequence and block chain generation: Generate a real-valued pseudo-random sequence of length N based on the user key Key R={r i |i=1, 2,...,N}, ordered by the index of R Sequence generation block chain {(X i ,X i′ )|i, i′∈[1,N]}, i' is the value of the i-th element in the R index ordered sequence, and X i' is the mapping of X i piece;

A3、变容量特征提取:对每个图像块Xi计算生成v比特块特征Fi={fi1,fi2,...,fiv}。其中,fi2~fi6为图像块Xi高5位平均值的5位二进制编码,如果图像块Xi为平滑图像块,则v=6且fi1=0,否则v=12,fi1=1,fi7~fi12为非平滑图像块的细节编码;  A3. Variable capacity feature extraction: calculate and generate v-bit block feature F i ={f i1 , f i2 , . . . , f iv } for each image block X i . Among them, f i2 ~ f i6 is the 5-bit binary code of the average value of the upper 5 bits of the image block Xi , if the image block Xi is a smooth image block, then v=6 and f i1 =0, otherwise v=12, f i1 =1, f i7 ~ f i12 are the detail coding of the non-smooth image block;

本实施例中,图像块Xi高5位平均值的二进制编码根据式 

Figure BDA0000048948190000071
计算,其中(.)B表示整数的二进制编码。  In this embodiment, the binary coding of the high 5-bit average value of the image block Xi is according to the formula
Figure BDA0000048948190000071
Compute, where (.) B represents the binary encoding of the integer.

非平滑图像块的细节编码fi7~fi12通过图像块分类获取。根据2×2图像块中值最大的两个像素出现位置,将非平滑图像块分为6类,最大两个像素位于图像块:上方的fi7~fi9编码为001,下方的fi7~fi9编码为010,左侧的fi7~fi9编码为011,右侧的fi7~fi9编码为100,左斜(左上、右下)的fi7~fi9编码为101,右斜(右上、左下)的fi7~fi9编码为110,如图2所示。fi10~fi12为两个最大值像素和与两个最小值像素和之差的均匀量化二进制编码,即 

Figure BDA0000048948190000072
其中j’(j=1,2,3,4)为图像块四个像素的索引有序序列。  The detail codes f i7 -f i12 of the non-smooth image blocks are obtained by classifying the image blocks. According to the appearance position of the two largest pixels in the 2×2 image block, the non-smooth image block is divided into 6 categories, and the largest two pixels are located in the image block: f i7 ~ f i9 above are coded as 001, and f i7 ~ f i9 below are coded as 001 f i9 is coded as 010, f i7 to f i9 on the left are coded as 011, f i7 to f i9 on the right are coded as 100, f i7 to f i9 are coded as 101 for left oblique (upper left and lower right), and f i7 to f i9 for right oblique (upper right, lower left) f i7 ˜f i9 are coded as 110, as shown in FIG. 2 . f i10 ~ f i12 is the uniform quantized binary code of the difference between the sum of two maximum pixels and the sum of two minimum pixels, namely
Figure BDA0000048948190000072
Where j' (j=1, 2, 3, 4) is an ordered sequence of indexes of four pixels of the image block.

A4、变容量水印生成:利用伪随机序列R的第i个随机数ri生成二值伪随机序列Bi={bij|j=1,2,...12},加密图像块特征Fi={fi1,fi2,...,fiv}生成恢复水印 Wi={wi1,wi2,...,wiv},  A4. Variable-capacity watermark generation: use the i-th random number r i of the pseudo-random sequence R to generate a binary pseudo-random sequence B i ={b ij |j=1, 2,...12}, and encrypt image block features F i = {f i1 , f i2 , ..., f iv } generate restored watermark W i = {w i1 , w i2 , ..., w iv },

ww ijij == ff ijij ⊕⊕ bb ijij

其中, 

Figure BDA0000048948190000082
为异或操作。对平滑图像块,伪随机序列Bi={bij|j=1,2,…12}仅用前6个比特;对非平滑图像块,伪随机序列Bi={bij|j=1,2,…12}的12个比特都用。  in,
Figure BDA0000048948190000082
is an XOR operation. For a smooth image block, the pseudo-random sequence B i ={b ij |j=1, 2,...12} only uses the first 6 bits; for a non-smooth image block, the pseudo-random sequence B i ={b ij |j=1 , 2,...12} all 12 bits are used.

A5、变容量水印嵌入:把图像块Xi的恢复水印Wi嵌入其映射块Xi’的低有效位,生成含水印图像块Yi’,  A5. Variable-capacity watermark embedding: Embed the restored watermark W i of the image block Xi into the least significant bit of its mapping block Xi ' to generate a watermarked image block Y ' ,

如果Xi为非平滑图像块,  If Xi is a non-smooth image block,

Figure BDA0000048948190000083
Figure BDA0000048948190000083

如果Xi为平滑图像块,  If Xi is a smooth image patch,

Figure BDA0000048948190000084
Figure BDA0000048948190000084

B、水印提取与比较  B. Watermark extraction and comparison

B1、分块、伪随机序列和块链生成:Y*是含水印图像Y传输后接收到的被测图像,按A1步操作把Y*分为2×2块 再按A2步相同的操作和密钥Key生成随机序列R和块链 

Figure BDA0000048948190000086
B1. Blocking, pseudo-random sequence and block chain generation: Y * is the tested image received after the watermarked image Y is transmitted, and Y * is divided into 2×2 blocks according to step A1 Then follow the same operation and key Key in step A2 to generate random sequence R and block chain
Figure BDA0000048948190000086

B2、块特征计算与重构:对每个被测图像块 

Figure BDA0000048948190000087
按A3步操作计算出图像块特征 
Figure BDA0000048948190000088
同时根据从其映射图像块 
Figure BDA0000048948190000089
低有效位提取恢复水印 
Figure BDA00000489481900000810
重构出块特征 
Figure BDA00000489481900000811
B2. Block feature calculation and reconstruction: for each tested image block
Figure BDA0000048948190000087
Calculate the image block features according to the A3 step operation
Figure BDA0000048948190000088
while mapping image blocks according to
Figure BDA0000048948190000089
Least Significant Bit Extraction and Restoration of Watermark
Figure BDA00000489481900000810
Refactor block feature
Figure BDA00000489481900000811

Ff ii LL == WW ii ** ⊕⊕ BB ii

其中,Bi为基于ri生成的长度为12的二值伪随机序列,从其映射图像块 

Figure BDA00000489481900000813
低位提取水印信息 
Figure BDA00000489481900000814
按以下公式得到,  Among them, B i is a binary pseudo-random sequence of length 12 generated based on r i , from which the image block is mapped
Figure BDA00000489481900000813
Low bit extraction watermark information
Figure BDA00000489481900000814
According to the following formula,

B3、分类特征比较:比较被测图像块 高位计算得到的块特征 

Figure BDA00000489481900000817
和从其映射块 
Figure BDA00000489481900000818
低有效位提取恢复水印重构的块特征 
Figure BDA00000489481900000819
按下列公式生成比较矩D={di|i=1,2,...,N},  B3. Classification feature comparison: compare the tested image blocks Block characteristics obtained by high-level calculation
Figure BDA00000489481900000817
and map blocks from it
Figure BDA00000489481900000818
Extraction of Least Significant Bits to Recover Block Features of Watermark Reconstruction
Figure BDA00000489481900000819
Generate comparative moment D={d i |i=1, 2,..., N} according to the following formula,

其中 

Figure BDA0000048948190000092
也就是说,对平滑图像块,比较 与 
Figure BDA0000048948190000094
前6个比特是否相同;对非平滑图像块,比较 与 
Figure BDA0000048948190000096
所有12个比特是否相同。  in
Figure BDA0000048948190000092
That is, for smooth image blocks, comparing and
Figure BDA0000048948190000094
Whether the first 6 bits are the same; for non-smooth image blocks, compare and
Figure BDA0000048948190000096
Are all 12 bits the same.

C、篡改检测  C. Tamper detection

C1、计算生成比较矩阵D的邻域特征矩阵Δ={δi|i=1,2,...,N},  C1. Calculate and generate the neighborhood characteristic matrix Δ={δ i |i=1, 2, ..., N} of the comparison matrix D,

δi=∑dj,j=i±1,i±n,i+n±1,i-n±1  δ i =∑d j , j=i±1, i±n, i+n±1, in±1

其中,D的邻域特征矩阵Δ={δi|i=1,2,...,N}的生成方法为现有方法,具体做法详见文献He Hong-jie,Zhang Jia-shu,Chen Fen.A self-recovery fragile watermarking scheme for image authentication with superior localization,Science in China Series F-Information Sciences,2008.51(10):1487-1507.  Among them, the generation method of D's neighborhood feature matrix Δ={δ i |i=1, 2, ..., N} is an existing method, and the specific method is detailed in the literature He Hong-jie, Zhang Jia-shu, Chen Fen. A self-recovery fragile watermarking scheme for image authentication with superior localization, Science in China Series F-Information Sciences, 2008.51(10): 1487-1507.

C2、根据比较矩阵D和及其邻域特征矩阵Δ,生成初态篡改检测矩阵T0 T 0 = ( t i 0 | i = 1,2 , . . . , N ) , C2. According to the comparison matrix D and its neighborhood feature matrix Δ, generate the initial state tampering detection matrix T 0 T 0 = ( t i 0 | i = 1,2 , . . . , N ) ,

Figure BDA0000048948190000098
Figure BDA0000048948190000098

C3、根据上步生成的初态篡改检测矩阵T0生成篡改检测矩阵T,  C3. Generate a tampering detection matrix T according to the initial state tampering detection matrix T0 generated in the previous step,

Figure BDA0000048948190000099
Figure BDA0000048948190000099

其中 

Figure BDA00000489481900000910
j=i±1,i±n,i±n±1。ti=1表示被测图像块 
Figure BDA00000489481900000911
被篡改,ti=0表示被测图像块 
Figure BDA00000489481900000912
是真实的;  in
Figure BDA00000489481900000910
j=i±1, i±n, i±n±1. t i =1 means the image block under test
Figure BDA00000489481900000911
tampered, t i =0 means the image block under test
Figure BDA00000489481900000912
It is true;

D、篡改恢复  D. Tamper recovery

如果T中元素不全为0,表明被测图像中存在篡改图像块,则对被测图像依次执行以下两步得到篡改恢复图像YR;  If the elements in T are not all 0, it indicates that there is a tampered image block in the tested image, then perform the following two steps in turn on the tested image to obtain the tampered recovery image Y R ;

D1、特征恢复:对判定为篡改的图像块 

Figure BDA00000489481900000913
如果其映射块Yi’ *是真实的,用B2步重构块特征 
Figure BDA00000489481900000914
对 
Figure BDA00000489481900000915
进行恢复,  D1. Feature recovery: For image blocks judged to be tampered
Figure BDA00000489481900000913
If its mapped block Y i' * is real, reconstruct block features with B2 step
Figure BDA00000489481900000914
right
Figure BDA00000489481900000915
to restore,

Figure BDA00000489481900000916
Figure BDA00000489481900000916

其中,Γ-1()为图像块特征编码函数的反函数;同时生成标示矩阵L,用以标记没有被恢复的篡改块,  Among them, Γ -1 () is the inverse function of the feature encoding function of the image block; at the same time, a label matrix L is generated to mark the tampered block that has not been restored,

D2、邻域恢复:如果L中元素不全为0,对li=1对应图像块 

Figure BDA0000048948190000102
利用与其相邻12个像素中的有效像素均值修正图像块 
Figure BDA0000048948190000103
中的每一个像素的值。  D2. Neighborhood recovery: if the elements in L are not all 0, the image block corresponding to l i =1
Figure BDA0000048948190000102
Correct the image block by using the mean value of the effective pixels in the 12 adjacent pixels
Figure BDA0000048948190000103
The value of each pixel in .

本发明的效果可以通过以下性能分析与实验验证  Effect of the present invention can be verified by following performance analysis and experiments

分析验证时,特征容量和水印容量分别用单位像素生成或嵌入的比特数(bpp:bit per pixel)来衡量,含水印图像的质量用它与原始图像的峰值信噪比来衡量(单位为dB),并选取一下文献[1]、[2]两种具有代表性的数字图像篡改内容可恢复的水印生成与认证算法做比较:  When analyzing and verifying, the feature capacity and watermark capacity are measured by the number of bits generated or embedded per pixel (bpp: bit per pixel), and the quality of the watermarked image is measured by its peak signal-to-noise ratio with the original image (in dB ), and select two representative watermark generation and authentication algorithms of [1] and [2] for digital image tampering content recovery:

文献[1]Z.Qian,G.Feng,X.Zhang,S.Wang.Image self-embedding with high-quaility restoration capability,2011(21):278-286  Literature [1] Z. Qian, G. Feng, X. Zhang, S. Wang. Image self-embedding with high-quality restoration capability, 2011(21): 278-286

文献[2]He Hong-jie,Zhang Jia-shu,Chen Fen.A self-recovery fragile watermarking scheme for image authentication with superior localization,Science in China Series F-Information Sciences,2008.51(10):1487-1507.  Literature [2] He Hong-jie, Zhang Jia-shu, Chen Fen. A self-recovery fragile watermarking scheme for image authentication with superior localization, Science in China Series F-Information Sciences, 2008.51(10): 1487-1507.

1、特征容量与重构质量  1. Feature capacity and reconstruction quality

特征提取是生成恢复水印的重要步骤。理想的情况是用尽可能少的容量保存尽可能多的图像特征。采用相似的特征提取方法,提取的图像块特征越多,根据特征重构的图像质量越好,但特征信息也增大。表1给出了本发明与现有文献[1]和文献[2]两种恢复水印算法的特征容量与重构质量的统计结果。由表1可以看出,本发明的特征信息最多,相应地其利用特征重构的图像质量也最好。文献[1]的特征信息最少,其重构质量较好,尤其对其比较平滑的数字图像,这是由于文献[1]是利用8×8图像块的重要DCT系数生成恢复水印,而DCT变换能有效去除了像素间冗余,不过由于图像块较大导致算法的篡改定位精度不高,并可能降低恢复图像的质量。由表1还可以看出,文献[1]对不同数字图像提取的特征信息都是1bpp,文献[2]对不同数字图像提取的特征信息都是1.5bpp,这说明文献[1]和[2]提取的特征容量都是固定的。相反,本发明对不同数 字图像提取的特征容量是可变的,变化范围为1.80~2.62bpp。图像越平滑,提取的特征容量越小。  Feature extraction is an important step in generating restored watermarks. The ideal is to hold as many image features as possible with as little capacity as possible. Using a similar feature extraction method, the more image block features are extracted, the better the image quality will be reconstructed according to the features, but the feature information will also increase. Table 1 presents the statistical results of the feature capacity and reconstruction quality of the present invention and the existing literature [1] and literature [2] for restoring watermarking algorithms. It can be seen from Table 1 that the present invention has the most feature information, and correspondingly, the image quality reconstructed by using features is also the best. Literature [1] has the least feature information, and its reconstruction quality is better, especially for relatively smooth digital images. This is because literature [1] uses the important DCT coefficients of 8×8 image blocks to generate the restored watermark, and the DCT transform It can effectively remove the redundancy between pixels, but due to the large image block, the tampering positioning accuracy of the algorithm is not high, and the quality of the restored image may be reduced. It can also be seen from Table 1 that the feature information extracted by document [1] for different digital images is 1bpp, and the feature information extracted by document [2] for different digital images is 1.5bpp, which shows that documents [1] and [2] ] The extracted feature capacity is fixed. On the contrary, the feature capacity extracted from different digital images by the present invention is variable, and the variation range is 1.80-2.62bpp. The smoother the image, the smaller the extracted feature capacity. the

表1本发明和现有文献方法的特征容量与重构质量的统计结果  Table 1 The statistical results of the feature capacity and reconstruction quality of the present invention and existing literature methods

Figure BDA0000048948190000111
Figure BDA0000048948190000111

2、水印容量与含水印图像质量  2. Watermark capacity and watermarked image quality

由于可恢复水印算法的水印容量较大,为尽可能降低水印嵌入引入的图像变形,可恢复水印大多在空域的低有效位嵌入水印信息。因此,可恢复水印算法的水印嵌入容量越大,带来图像变形也越严重,即生成的含水印图像的质量越差。表2给出了本发明与现有文献[1]和文献[2]两种恢复水印算法的水印容量与含水印图像质量的统计结果。由表2看出,文献[1]和[2]的水印容量都是固定的,分别为3bpp和1.5bpp,而本发明的水印容量是可变的。文献[1]对不同图像生成的含水印数字图像的质量相似,其峰值信噪比分别约为38dB,文献[2]对不同图像生成的含水印数字图像的质量也相似,其峰值信噪比分别约为48dB。本发明对不同图像生成的含水印数字图像的质量相差较大,其峰值信噪比介于38——43dB之间,图像越平滑,生成的含水印图像的质量越好。  Due to the large watermark capacity of the recoverable watermarking algorithm, in order to minimize the image deformation caused by watermark embedding, the recoverable watermarks are mostly embedded in the low significant bits of the spatial domain. Therefore, the larger the watermark embedding capacity of the recoverable watermarking algorithm, the more serious the image deformation will be, that is, the poorer the quality of the generated watermarked image. Table 2 shows the statistical results of the watermark capacity and watermarked image quality of the present invention and the existing literature [1] and literature [2]. Seen from Table 2, the watermark capacity of documents [1] and [2] are fixed, respectively 3bpp and 1.5bpp, but the watermark capacity of the present invention is variable. The quality of watermarked digital images generated by different images in literature [1] is similar, and their peak signal-to-noise ratios are about 38dB. Literature [2] also has similar quality of watermarked digital images generated by different images, and their peak signal-to-noise ratio are about 48dB respectively. The quality of the watermarked digital images generated by the present invention is quite different from different images, the peak signal-to-noise ratio is between 38-43dB, and the smoother the image, the better the quality of the generated watermarked images. the

对比表1和表2可以看出,本发明与文献[2]在水印嵌入时没有增加冗余信息,而文献[1]为定位篡改和提高篡改恢复质量,嵌入的水印容量是特征信息的3倍,降低了含水印图像的质量,本发明生成的含水印图像的峰值信噪比均高 于文献[1]。  Comparing Table 1 and Table 2, it can be seen that the present invention and literature [2] do not add redundant information when embedding watermarks, while literature [1] uses 3 times the capacity of embedded watermarks to locate tampering and improve the quality of tampering recovery. times, the quality of the watermarked image is reduced, and the peak signal-to-noise ratio of the watermarked image generated by the present invention is higher than that of the literature [1]. the

表2本发明和现有文献的水印容量与含水印图像质量的统计结果  Table 2 Statistical results of watermark capacity and watermarked image quality of the present invention and existing documents

Figure BDA0000048948190000121
Figure BDA0000048948190000121

3、一般篡改  3. General tampering

图3给出一般篡改条件下,本发明与现有文献[1]和文献[2]两种恢复水印算法的篡改检测与篡改恢复结果。图3中(a)分图是大小为328×328像素的Beach原始灰度图像,图3中(b)分图为利用本发明算法生成的含水印数字图像,其峰值信噪比为42.93dB,图3中(c)分图为篡改图像,其中包含以下篡改:添加文字“ITP Southwest Jiaotong University”;在下方添加一只小鹿,篡改像素比例约为7.78%。图3中(d)分图,(e)分图和(f)分图分别为本发明、现有文献[1]和文献[2]两种恢复水印算法的篡改检测结果,从图中看出,文献[1]的定位精度低于本发明和文献[2],这是由于本发明和文献[2]的图像块大小为2×2像素,而文献[1]的图像块大小为8×8像素。为定量比较算法的篡改检测性能,以2×2像素为单位计算得到的本发明、文献[1]和文献[2]的漏检率分别为0.3%,0%和3.45%,虚检率分别为0.39%,5.13%和0.02%。图3中(g)分图,(h)分图和(i)分图分别为本发明、文献[1]和文献[2]的篡改恢复图像,它们与原始图像的峰值信噪比分别为43.63dB, 43.06dB和29.94dB。本发明与文献[1]的恢复效果相似,都得到了较好的篡改恢复效果。文献[2]的恢复效果较差,图3中(i)分图的篡改区域内有噪声点,这是由于这些篡改块的恢复水印信息也被破坏,而文献[2]无法有效恢复水印信息被改变的篡改块造成的。  Fig. 3 shows the tamper detection and tamper recovery results of the present invention and the existing literature [1] and literature [2] under general tampering conditions. Among Fig. 3 (a) part picture is the Beach original gray scale image that size is 328 * 328 pixels, among Fig. 3 (b) part picture is the watermarked digital image that utilizes the algorithm of the present invention to generate, and its peak signal-to-noise ratio is 42.93dB , sub-picture (c) in Figure 3 is a tampered image, which contains the following tampering: add the text "ITP Southwest Jiaotong University"; add a deer below, and the ratio of tampered pixels is about 7.78%. In Fig. 3, (d) sub-graph, (e) sub-graph and (f) sub-graph are respectively the tampering detection results of the two recovery watermarking algorithms of the present invention, existing literature [1] and literature [2]. It can be seen from the figure It is found that the positioning accuracy of literature [1] is lower than that of the present invention and literature [2], because the image block size of the present invention and literature [2] is 2×2 pixels, while the image block size of literature [1] is 8 ×8 pixels. In order to quantitatively compare the tamper detection performance of the algorithm, the missed detection rates of the present invention, the literature [1] and the literature [2] calculated in units of 2×2 pixels are 0.3%, 0% and 3.45%, respectively, and the false detection rates are respectively 0.39%, 5.13% and 0.02%. In Fig. 3, (g) sub-image, (h) sub-image and (i) sub-image are the tampered recovery images of the present invention, document [1] and document [2] respectively, and their peak signal-to-noise ratios with the original image are respectively 43.63dB, 43.06dB and 29.94dB. The recovery effect of the present invention is similar to that of the document [1], both of which have obtained better tampering recovery effects. The recovery effect of literature [2] is poor. There are noise points in the tampered area of (i) in Figure 3. This is because the restored watermark information of these tampered blocks is also destroyed, and literature [2] cannot effectively restore the watermark information caused by altered tampered blocks. the

由上述比较可以看出,一般篡改条件下,本发明与文献[2]有相似的定位精度,优于文献[1],同时,本发明与文献[1]有相似的篡改恢复质量,优于文献[2]。即本发明同时具有好的篡改定位精度和篡改恢复质量。  From the above comparison, it can be seen that under general tampering conditions, the present invention has similar positioning accuracy to document [2], which is better than document [1]. At the same time, the present invention has similar tamper recovery quality to document [1], which is better than Literature [2]. That is, the present invention has good tampering localization accuracy and tampering recovery quality at the same time. the

4、恒均值攻击  4. Constant mean value attack

图4给出均值攻击条件下,本发明、现有文献[1]和文献[2]两种恢复水印算法的篡改检测与篡改恢复结果。图4中(a)分图是大小为256×256像素的Lena原始灰度图像,图4中(b)分图为利用本发明算法生成的含水印数字图像,其峰值信噪比为42.54dB。图4中(c)分图为篡改图像,其中,大小140×140像素的正方形区域遭到均值攻击,篡改比例约为30%。图4中(d)分图,(e)分图和(f)分图分别为本发明、文献[1]和文献[2]的篡改检测结果。图4中(f)分图没有白色区域,说明文献[2]不能检测该篡改,即漏检率分别为100%,这说明文献[2]不能抵抗恒均值攻击。由于没有检测到篡改块,算法不会对篡改图像进行篡改恢复,其篡改恢复图像(如图4中(i)分图所示)与被测图像(图4中(c)分图)相同,与原始图像的峰值信噪比为11.20dB。本发明与文献[1]都能检测该篡改,以2×2像素为单位计算得到的本发明和文献[1]的漏检率分别为0.21%和0%,虚检率分别为0.94%和3.6%。比较图4中(d)分图和(e)分图也可以看出,本发明篡改检测中存在少数几个漏检图像块,这是由于本发明定位篡改的单位为2×2像素且均值攻击是针对2×2图像块实施的。文献[1]以8×8像素为单位判定篡改块,因此文献[1]的篡改区内不存在漏检的图像块。在算法篡改检测中没有被判定为篡改的图像块不执行篡改恢复操作,导致本发明算法的篡改恢复质量略低于文献[1]。图4中(g)分图和(h)分图分别为本发明和文献[1]的篡改恢复图像,它们与原始图像的峰值信噪比分别为30.81dB和31.39dB。从图4中(g)分图可以看出,本发 明篡改恢复图像的存在少数几个噪声点(显示“帽子“区域),这是因为该区域存在漏检块,没执行篡改恢复操作造成的。  Fig. 4 shows the tampering detection and tampering recovery results of the present invention, the existing document [1] and the document [2] under the condition of mean value attack. Among Fig. 4, (a) sub-picture is the Lena original grayscale image with a size of 256 × 256 pixels, and among Fig. 4 (b) sub-picture is a watermarked digital image generated by the algorithm of the present invention, and its peak signal-to-noise ratio is 42.54dB . Part (c) of Figure 4 is a tampered image, in which a square area with a size of 140×140 pixels is attacked by the mean value, and the tampering ratio is about 30%. Figure 4 (d) sub-graph, (e) sub-graph and (f) sub-graph are the tampering detection results of the present invention, document [1] and document [2] respectively. In Figure 4 (f) there is no white area, indicating that the document [2] cannot detect the tampering, that is, the missed detection rate is 100%, which indicates that the document [2] cannot resist the constant mean attack. Since no tampered block is detected, the algorithm will not perform tampering recovery on the tampered image. The peak signal-to-noise ratio with the original image is 11.20dB. Both the present invention and the document [1] can detect the tampering, and the missed detection rates of the present invention and the document [1] calculated in units of 2×2 pixels are 0.21% and 0%, respectively, and the false detection rates are 0.94% and 0%, respectively. 3.6%. Comparing the sub-graphs (d) and (e) in Figure 4, it can also be seen that there are a few missed image blocks in the tampering detection of the present invention. The attack is carried out on 2×2 image blocks. Document [1] judges tampered blocks in units of 8×8 pixels, so there is no missing image block in the tampered area of Document [1]. In the algorithm tampering detection, the image blocks that are not judged as tampering do not perform the tampering recovery operation, resulting in the tampering recovery quality of the algorithm of the present invention being slightly lower than that of the literature [1]. Parts (g) and (h) in Fig. 4 are tampered restored images of the present invention and literature [1] respectively, and their peak signal-to-noise ratios compared with the original image are 30.81dB and 31.39dB, respectively. It can be seen from the (g) sub-graph in Figure 4 that there are a few noise points (displaying the "hat" area) in the tampered restoration image of the present invention, which is because there are missed detection blocks in this area, and the tampering restoration operation is not performed. of. the

由上述比较可以看出,文献[2]不能抵抗针对2×2块实施的均值攻击。本发明与文献[1]能检测该类篡改并有效对篡改区域执行恢复,本发明的定位精度高于文献[1],虚检率低于文献[1],但漏检率略高于文献[1],导致篡改恢复质量略低于文献[1]。  It can be seen from the above comparison that the literature [2] cannot resist the mean value attack on 2×2 blocks. The present invention and document [1] can detect such tampering and effectively restore the tampered area. The positioning accuracy of the present invention is higher than that of document [1], and the false detection rate is lower than that of document [1], but the missed detection rate is slightly higher than that of document [1]. [1], resulting in slightly lower tamper recovery quality than in [1]. the

5、拼贴攻击  5. Collage attack

图5给出拼贴攻击条件下,本发明、现有文献[1]和文献[2]两种恢复水印算法的篡改检测与篡改恢复结果。图5中(a)分图和(b)分图分别是利用相同密钥生成的含水印Monlisa和Napoleon灰度图像,它们的大小均208×328像素。将含水印Monelisa图像的头部区域替换为含水印Napoleon图像的相同区域(拼贴攻击),得到的篡改图像如图4中(c)分图所示,篡改比例约为18%。图5中(d)分图,(e)分图和(f)分图分别为本发明、文献[1]和文献[2]的篡改检测结果,以2×2像素为单位计算得到的本发明、文献[1]和文献[2]的漏检率分别为2.03%,86.67%和20.22%,虚检率分别为0.13%,2.27%和0.26%。由图5中(e)分图可以看出,文献[1]仅检测出拼贴区域的边界,拼贴区域的内部通过认证。文献[1]之所以能检测出位于拼贴区域边界的8×8图像块,是因为拼贴攻击仅改变了这些图像块中的部分像素。由于没有被检测出篡改的图像块并不执行篡改恢复操作,导致文献[1]的篡改恢复质量较低,如图5中(h)分图所示,其峰值信噪比为17.72dB。本发明与文献[2]能抵抗拼贴攻击,对比图5中(d)分图和(f)分图,(d)分图中拼贴区域的黑色点的比(f)分图中的多,这说明本发明的漏检率低于文献[2]。本发明能有效恢复水印信息也被篡改的图像块,因此本发明的篡改恢复质量明显优于文献[2]。图5中(g)分图和(i)分图分别是本发明和文献[2]的篡改恢复图像,它们的峰值信噪比分别为33.82dB和24.83dB。  Fig. 5 shows the tamper detection and tamper recovery results of the present invention, the existing document [1] and the document [2] under the collage attack condition. Part (a) and part (b) in Figure 5 are the watermarked Monlisa and Napoleon grayscale images generated with the same key, respectively, and their size is 208×328 pixels. Replace the head area of the watermarked Monelisa image with the same area of the watermarked Napoleon image (collage attack), and the obtained tampered image is shown in Figure 4 (c), and the tampered ratio is about 18%. In Fig. 5, (d), (e) and (f) are the tampering detection results of the present invention, literature [1] and literature [2], respectively, and are calculated in units of 2×2 pixels. The missed detection rates of invention, literature [1] and literature [2] were 2.03%, 86.67% and 20.22%, respectively, and the false detection rates were 0.13%, 2.27% and 0.26%. It can be seen from the part (e) in Figure 5 that literature [1] only detects the boundary of the collage area, and the interior of the collage area is certified. The reason why the literature [1] can detect the 8×8 image blocks located at the boundary of the collage area is that the collage attack only changes some pixels in these image blocks. Since the image blocks that have not been detected for tampering do not perform tampering recovery operations, the tampering recovery quality of the literature [1] is low, as shown in the sub-graph (h) of Figure 5, and its peak signal-to-noise ratio is 17.72dB. The present invention and literature [2] can resist the collage attack. Comparing the (d) sub-graph and (f) sub-graph in Figure 5, the ratio of the black points in the collage area in (d) sub-graph to (f) in the sub-graph Many, which shows that the missed detection rate of the present invention is lower than that of literature [2]. The invention can effectively restore the image blocks whose watermark information has been tampered with, so the quality of the tampering recovery of the invention is obviously better than that of literature [2]. Part (g) and part (i) in Fig. 5 are tampered recovery images of the present invention and literature [2] respectively, and their peak signal-to-noise ratios are 33.82dB and 24.83dB respectively. the

由上述比较看出,文献[1]不能抵抗拼贴攻击,本发明与文献[2]能抵抗拼贴攻击,本发明的篡改经检测性能和篡改恢复质量都明显优于文献[2]。  It can be seen from the above comparison that the document [1] cannot resist the collage attack, but the present invention and the document [2] can resist the collage attack. the

表3给出了三种篡改方式下本发明、现有文献[1]和文献[2]两种恢复水印算法的篡改检测性能(误检率)和篡改恢复质量(篡改恢复图像与含水印图像的峰值信噪比)的比较结果。综上可以看出,本发明算法中的恢复水印容量是可变的。对不同数字图像生成不同容量的恢复水印,图像越平滑,生成的恢复水印量越少。在满足图像块信息量保存的前提下尽可能降低了恢复水印嵌入容量,从而提高含水印图像的质量。同时,本发明算法具有较高的篡改定位性能和篡改恢复质量。在一般篡改、均值攻击、拼贴攻击下,都能精确定位篡改位置、高概率检测篡改块、高质量恢复篡改图像。  Table 3 shows the tampering detection performance (false detection rate) and tampering restoration quality (tampering restoration image and watermarked image The comparison results of the peak signal-to-noise ratio). In summary, it can be seen that the restored watermark capacity in the algorithm of the present invention is variable. Different volumes of restored watermarks are generated for different digital images. The smoother the image, the smaller the amount of restored watermarks generated. Under the premise of satisfying the preservation of the image block information, the watermark embedding capacity is reduced as much as possible, thereby improving the quality of the watermarked image. At the same time, the algorithm of the invention has higher tampering location performance and tampering recovery quality. Under general tampering, mean attack, and collage attack, it can accurately locate the tampered position, detect tampered blocks with high probability, and restore tampered images with high quality. the

表3篡改检测性能与篡改恢复质量比较  Table 3 Comparison of tamper detection performance and tamper recovery quality

注:误检率=篡改比例×漏检率+(1-篡改比例)×虚检率 。 Note: False detection rate = tampering ratio × missed detection rate + (1- tampering ratio) × false detection rate.

Claims (1)

1.一种数字图像篡改内容可恢复的变容量水印生成与认证方法,包括如下步骤: 1. A variable-capacity watermark generation and authentication method with recoverable tampering content of a digital image, comprising the following steps: A、水印生成与嵌入 A. Watermark generation and embedding A1、图像分块并分类:将大小为2m×2n的原始图像X分为m×n个互不重叠的2×2图像块Xi={xi1,xi2,xi3,xi4},其中,i为图像块编号,i=1,2,...,N,N=m×n为图像块个数;并根据图像块内容将图像块分为平滑图像块和非平滑图像块两类; A1. Image segmentation and classification: Divide the original image X with a size of 2m×2n into m×n non-overlapping 2×2 image blocks X i ={ xi1 , xi2 , xi3 , xi4 }, Wherein, i is the image block number, i=1, 2,..., N, N=m×n is the number of image blocks; and the image blocks are divided into smooth image blocks and non-smooth image blocks according to the content of the image blocks kind; A2、伪随机序列与块链生成:基于用户密钥Key生成长度为N的实值伪随机序列R={ri|i=1,2,...,N},由R的索引有序序列生成块链{(Xi,Xi′)|i,i′∈[1,N]},i′为R索引有序序列中第i个元素的值,Xi’为Xi的映射块; A2. Pseudo-random sequence and block chain generation: Generate a real-valued pseudo-random sequence of length N based on the user key Key R={r i |i=1, 2,...,N}, ordered by the index of R Sequence generation block chain {(X i ,X i′ )|i, i′∈[1,N]}, i′ is the value of the i-th element in the R index ordered sequence, and X i’ is the mapping of X i piece; A3、变容量特征提取:对每个图像块Xi计算生成v比特块特征Fi={fi1,fi2,...,fiv},其中,fi2~fi6为图像块Xi高5位平均值的5位二进制编码,如果图像块Xi为平滑图像块,则v=6且fi1=0,否则v=12,fi1=1,fi7~fi12为非平滑图像块的细节编码; A3. Variable capacity feature extraction: calculate and generate v-bit block features F i ={f i1 , f i2 ,..., f iv } for each image block X i , where f i2 ~ f i6 are image blocks X i The 5-bit binary code of the upper 5-bit average value, if the image block X i is a smooth image block, then v=6 and f i1 =0, otherwise v=12, f i1 =1, f i7 ~ f i12 are non-smooth images the detail encoding of the block; A4、变容量水印生成:利用伪随机序列R的第i个随机数ri生成二值伪随机序列Bi={bij|j=1,2,...12},加密图像块特征Fi={fi1,fi2,...,fiv}生成恢复水印Wi={wi1,wi2,...,wiv}, A4. Variable-capacity watermark generation: use the i-th random number r i of the pseudo-random sequence R to generate a binary pseudo-random sequence B i ={b ij |j=1, 2,...12}, and encrypt image block features F i = {f i1 , f i2 , ..., f iv } generate restored watermark W i = {w i1 , w i2 , ..., w iv },
Figure FDA0000156010810000011
Figure FDA0000156010810000011
其中, 为异或操作;对平滑图像块bij的下标j取值范围为1~6,对非平滑图像块bij的下标j取值范围为1~12; in, is an XOR operation; the value range of subscript j for smooth image block b ij is 1-6, and the value range of subscript j for non-smooth image block b ij is 1-12; A5、变容量水印嵌入:把图像块Xi的恢复水印Wi嵌入其映射块Xi’的低有效位生成含水印图像块Yi’A5 . Variable-capacity watermark embedding: Embed the restored watermark W i of the image block Xi into the least significant bit of its mapping block Xi ' to generate a watermarked image block Y i' , 如果Xi为非平滑图像块, If Xi is a non-smooth image block, 如果Xi为平滑图像块, If Xi is a smooth image patch,
Figure FDA0000156010810000014
Figure FDA0000156010810000014
B、水印提取与比较 B. Watermark extraction and comparison B1、分块、伪随机序列和块链生成:Y*是含水印图像Y传输后接收到的被测图像,按A1步操作把Y*分为2×2块 
Figure FDA0000156010810000021
再按A2步相同的操作和密钥Key生成随机序列R和块链 
Figure FDA0000156010810000022
B1. Blocking, pseudo-random sequence and block chain generation: Y * is the tested image received after the watermarked image Y is transmitted, and Y * is divided into 2×2 blocks according to step A1
Figure FDA0000156010810000021
Then follow the same operation and key Key in step A2 to generate random sequence R and block chain
Figure FDA0000156010810000022
B2、块特征计算与重构:对每个被测图像块 
Figure FDA0000156010810000023
按A3步操作计算出图像块特征 
Figure FDA0000156010810000024
同时根据从其映射图像块 低有效位提取的恢复水印 
Figure FDA0000156010810000026
重构出块特征 
Figure FDA0000156010810000027
B2. Block feature calculation and reconstruction: for each tested image block
Figure FDA0000156010810000023
Calculate the image block features according to the A3 step operation
Figure FDA0000156010810000024
while mapping image blocks according to Recovered Watermark Extracted by Least Significant Bits
Figure FDA0000156010810000026
Refactor block feature
Figure FDA0000156010810000027
Figure FDA0000156010810000028
Figure FDA0000156010810000028
其中,Bi为基于ri生成的长度为12的二值伪随机序列,从其映射图像块 
Figure FDA0000156010810000029
低位提取水印信息 
Figure FDA00001560108100000210
按以下公式得到,
Among them, B i is a binary pseudo-random sequence of length 12 generated based on r i , from which the image block is mapped
Figure FDA0000156010810000029
Low bit extraction watermark information
Figure FDA00001560108100000210
According to the following formula,
B3、分类特征比较:比较被测图像块 
Figure FDA00001560108100000212
高位计算得到的块特征 
Figure FDA00001560108100000213
和从其映射块 低有效位提取恢复水印重构的块特征 
Figure FDA00001560108100000215
按下列公式生成比较矩阵D={di|i=1,2,...,N},
B3. Classification feature comparison: compare the tested image blocks
Figure FDA00001560108100000212
Block characteristics obtained by high-level calculation
Figure FDA00001560108100000213
and map blocks from it Extraction of Least Significant Bits to Recover Block Features of Watermark Reconstruction
Figure FDA00001560108100000215
Generate comparison matrix D={d i |i=1, 2,..., N} according to the following formula,
其中
Figure FDA00001560108100000217
in
Figure FDA00001560108100000217
C、篡改检测 C. Tamper Detection C1、计算生成比较矩阵D的邻域特征矩阵Δ={δi|i=1,2,...,N}, C1. Calculate and generate the neighborhood characteristic matrix Δ={δ i |i=1, 2, ..., N} of the comparison matrix D, δi=∑dj,j=i±1,i±n,i+n±1,i-n±1 δ i =∑d j , j=i±1, i±n, i+n±1, in±1 C2、根据比较矩阵D和邻域特征矩阵Δ,生成初态篡改检测矩阵T0 C2. According to the comparison matrix D and the neighborhood feature matrix Δ, generate the initial state tampering detection matrix T 0
Figure FDA00001560108100000218
Figure FDA00001560108100000218
Figure FDA00001560108100000219
Figure FDA00001560108100000219
C3、根据C2步生成的初态篡改检测矩阵T0生成篡改检测矩阵T,  C3. Generate a tampering detection matrix T according to the initial state tampering detection matrix T0 generated in the C2 step,
Figure FDA0000156010810000031
Figure FDA0000156010810000031
其中 j=i±1,i±n,i±n±1,ti=1表示被测图像块 
Figure FDA0000156010810000033
被篡改,ti=0表示被测图像块 
Figure FDA0000156010810000034
是真实的;
in j=i±1, i±n, i±n±1, t i =1 means the image block under test
Figure FDA0000156010810000033
tampered, t i =0 means the image block under test
Figure FDA0000156010810000034
It is true;
D、篡改恢复 D. Tamper recovery 如果T中元素不全为0,表明被测图像中存在篡改图像块,则对被测图像依次执行以下两步得到篡改恢复图像YRIf the elements in T are not all 0, it indicates that there is a tampered image block in the tested image, then perform the following two steps in turn on the tested image to obtain the tampered recovery image Y R ; D1、特征恢复:对判定为篡改的图像块 如果其映射块Yi’ *是真实的,用B2步重构块特征 
Figure FDA0000156010810000036
对 
Figure FDA0000156010810000037
进行恢复,
D1. Feature recovery: For image blocks judged to be tampered If its mapped block Y i' * is real, reconstruct block features with B2 step
Figure FDA0000156010810000036
right
Figure FDA0000156010810000037
to restore,
Figure FDA0000156010810000038
Figure FDA0000156010810000038
其中,Γ-1()为图像块特征编码函数的反函数;同时生成标示矩阵L,用以标记没有被恢复的篡改块, Among them, Γ -1 () is the inverse function of the feature encoding function of the image block; at the same time, a label matrix L is generated to mark the tampered block that has not been restored,
Figure FDA0000156010810000039
Figure FDA0000156010810000039
D2、邻域恢复:如果L中元素不全为0,对li=1对应图像块 
Figure FDA00001560108100000310
利用与其相邻12个像素中的有效像素均值修正图像块 中的每一个像素的值。 
D2. Neighborhood recovery: if the elements in L are not all 0, the image block corresponding to l i =1
Figure FDA00001560108100000310
Correct the image block by using the mean value of the effective pixels in the 12 adjacent pixels The value of each pixel in .
CN2011100528292A 2011-03-04 2011-03-04 Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks Expired - Fee Related CN102103738B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011100528292A CN102103738B (en) 2011-03-04 2011-03-04 Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100528292A CN102103738B (en) 2011-03-04 2011-03-04 Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks

Publications (2)

Publication Number Publication Date
CN102103738A CN102103738A (en) 2011-06-22
CN102103738B true CN102103738B (en) 2012-11-07

Family

ID=44156485

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100528292A Expired - Fee Related CN102103738B (en) 2011-03-04 2011-03-04 Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks

Country Status (1)

Country Link
CN (1) CN102103738B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9633228B1 (en) 2014-05-21 2017-04-25 Haim Maimon Verifiable media system and method

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103177364B (en) * 2011-12-26 2016-04-27 中国银联股份有限公司 based on the transaction processing method of electronic signature
CN103440617B (en) * 2013-09-18 2016-02-24 黄良永 Improve the image processing method of safety of medical image
JP6853934B2 (en) * 2017-01-19 2021-04-07 ブリルニクスジャパン株式会社 Solid-state image sensor, solid-state image sensor drive method, and electronic equipment
CN107801027A (en) * 2017-10-19 2018-03-13 西安万像电子科技有限公司 Image processing method, apparatus and system
CN108307203B (en) * 2017-12-28 2019-11-08 中国科学院自动化研究所 Video encryption method and decryption method based on multi-projector splicing and fusion
CN108876697B (en) * 2018-06-22 2022-02-25 南开大学 Pixel-level image authentication, tampering detection and recovery method
CN109462714B (en) * 2018-10-30 2020-05-12 成都优图有真像信息技术有限公司 Encrypted image multi-bit plane reversible data hiding method with low cloud storage overhead
CN110148079B (en) * 2019-05-27 2022-05-03 福建师范大学福清分校 A method of digital image tampering detection, localization and self-recovery
CN111784708B (en) * 2020-07-03 2021-03-12 上海骏聿数码科技有限公司 Image tamper-proof inspection method and device
CN112070636B (en) * 2020-09-09 2023-03-21 西南交通大学 Image electronic contract signing and verifying method with multistage evidence chain
CN112867002B (en) * 2021-01-15 2022-11-29 南京信息工程大学 A data authentication method for wireless sensor networks based on reversible watermark

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6671387B1 (en) * 2000-07-21 2003-12-30 Wen-Hsing Hsu Watermarking of a digitized image
CN1614634A (en) * 2004-12-06 2005-05-11 西南交通大学 Generating and authenticating method for positioned authenticating water-mark for recoverying distorted image contents

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6671387B1 (en) * 2000-07-21 2003-12-30 Wen-Hsing Hsu Watermarking of a digitized image
CN1614634A (en) * 2004-12-06 2005-05-11 西南交通大学 Generating and authenticating method for positioned authenticating water-mark for recoverying distorted image contents

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Hong-jie He et al..Block-Chain Based Fragile Watermarking Scheme with Superior Localization.《Lecture Notes in Computer Science》.2008,第5284卷全文. *
和红杰 等.自嵌入水印算法的安全性分析.《电子学报》.2007,第35卷(第3期),全文. *
张爱辉 等.抗几何攻击的数字图像水印算法综述.《微计算机应用》.2009,第30卷(第4期),全文. *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9633228B1 (en) 2014-05-21 2017-04-25 Haim Maimon Verifiable media system and method

Also Published As

Publication number Publication date
CN102103738A (en) 2011-06-22

Similar Documents

Publication Publication Date Title
CN102103738B (en) Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks
Singh et al. Wavelet based image watermarking: futuristic concepts in information security
Han et al. Content-based image authentication: current status, issues, and challenges
CN108876697A (en) Pixel-level image certification, tampering detection and restoration methods
CN106408495B (en) A High PSNR Fragile Watermarking Method Based on Chaos Theory
Li et al. Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme
Elshoura et al. A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments
Huo et al. Alterable-capacity fragile watermarking scheme with restoration capability
Raj et al. A survey on fragile watermarking based image authentication schemes
Chang et al. A block-based watermarking scheme for image tamper detection and self-recovery
CN102073978B (en) Method and system for identifying and recovering digital images by utilizing irregular region segmentation
CN101901470A (en) Image tampering detection and recovery method based on semi-fragile watermarking in energy domain
Hemida et al. A restorable fragile watermarking scheme with superior localization for both natural and text images
CN1960428A (en) Implementation method of anti printing and scanning meaningful digital watermark with large capacity
Chen et al. TSIA: A novel image authentication scheme for AMBTC-based compressed images using turtle shell based reference matrix
Liu et al. Adaptive feature calculation and diagonal mapping for successive recovery of tampered regions
Wang et al. Review on self-embedding fragile watermarking for image authentication and self-recovery
CN116416112A (en) A medical image self-recovery method based on image inpainting algorithm
CN103500350A (en) Chinese-sensible code and digital watermark-based anti-counterfeit method
Zhang et al. Blind dual watermarking scheme using stucki kernel and spiht for image self-recovery
CN103123719A (en) Zero watermark method for image authentication and tamper localization
Li et al. Block mapping and dual-matrix-based watermarking for image authentication with self-recovery capability
He et al. Self-recovery fragile watermarking using block-neighborhood tampering characterization
Li et al. Protecting biometric templates using authentication watermarking
Lu et al. Multipurpose image watermarking method based on mean-removed vector quantization

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20121107

Termination date: 20150304

EXPY Termination of patent right or utility model