CN117830071A - Image tampering detection and self-recovery method, device, equipment and storage medium - Google Patents
Image tampering detection and self-recovery method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN117830071A CN117830071A CN202410040248.4A CN202410040248A CN117830071A CN 117830071 A CN117830071 A CN 117830071A CN 202410040248 A CN202410040248 A CN 202410040248A CN 117830071 A CN117830071 A CN 117830071A
- Authority
- CN
- China
- Prior art keywords
- image
- information
- detected
- tampering
- detection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0042—Fragile watermarking, e.g. so as to detect tampering
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/95—Pattern authentication; Markers therefor; Forgery detection
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0065—Extraction of an embedded watermark; Reliable detection
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
Description
技术领域Technical Field
本发明涉及图像检测技术领域,尤其涉及一种图像篡改检测与自恢复方法、装置、设备及存储介质。The present invention relates to the field of image detection technology, and in particular to an image tampering detection and self-recovery method, device, equipment and storage medium.
背景技术Background technique
随着图像处理技术的飞速发展和Photoshop等图像编辑软件的广泛应用,图像篡改的门槛已被大幅降低。如今,无需专业的技术知识,普通人也能轻松对图像进行篡改。社交媒体的普及使得图像的传播变得前所未有的便捷,但同时也为图像篡改提供了广阔的平台。为了吸引关注,一些人可能会对图片进行篡改。更进一步,商业竞争和政治斗争中的一些参与者可能会通过篡改图像来误导公众,以实现自身的利益。比如,他们可能会篡改商品图片以提升销售额,或者篡改新闻图片以塑造或改变公众舆论。With the rapid development of image processing technology and the widespread use of image editing software such as Photoshop, the threshold for image tampering has been greatly lowered. Nowadays, ordinary people can easily tamper with images without professional technical knowledge. The popularity of social media has made the dissemination of images more convenient than ever before, but it has also provided a broad platform for image tampering. In order to attract attention, some people may tamper with pictures. Furthermore, some participants in commercial competition and political struggles may mislead the public by tampering with images in order to achieve their own interests. For example, they may tamper with product pictures to increase sales, or tamper with news pictures to shape or change public opinion.
并且现在主流的被动篡改检测技术的局限性在于仅发现图像中被篡改的区域,但未提供有效手段来还原篡改内容,有鉴于此,亟需一种准确检测图像篡改位置并能够进行恢复的方法,用于检测图像是否被篡改以及对篡改后的图像进行恢复。Moreover, the current mainstream passive tampering detection technology is limited in that it only detects the tampered areas in the image, but does not provide an effective means to restore the tampered content. In view of this, there is an urgent need for a method to accurately detect the image tampering location and restore it, which can be used to detect whether the image has been tampered with and to restore the tampered image.
上述内容仅用于辅助理解本发明的技术方案,并不代表承认上述内容是现有技术。The above contents are only used to assist in understanding the technical solution of the present invention and do not constitute an admission that the above contents are prior art.
发明内容Summary of the invention
本发明的主要目的在于提供一种图像篡改检测与自恢复方法、装置、设备及存储介质,旨在解决现有技术检测图像是否被篡改以及如何对篡改后的图像进行恢复的技术问题。The main purpose of the present invention is to provide an image tampering detection and self-recovery method, device, equipment and storage medium, aiming to solve the technical problems of the prior art in detecting whether an image has been tampered with and how to restore the tampered image.
为实现上述目的,本发明提供了一种图像篡改检测与自恢复方法,所述方法包括以下步骤:To achieve the above object, the present invention provides an image tampering detection and self-recovery method, the method comprising the following steps:
获取待检测图像,并对所述待检测图像进行检测预处理,得到待检测图像信息;Acquire an image to be detected, and perform detection preprocessing on the image to be detected to obtain information of the image to be detected;
对所述待检测图像信息进行检测,得到图像检测结果;Detecting the image information to be detected to obtain an image detection result;
若所述图像检测结果为异常时,对所述图像检测结果进行解析,得到图像篡改信息;If the image detection result is abnormal, analyzing the image detection result to obtain image tampering information;
根据所述图像篡改信息进行数据处理,得到对应的图像复原数据,并自动根据所述图像复原数据进行图像恢复,得到防篡改图像。Data processing is performed according to the image tampering information to obtain corresponding image restoration data, and image restoration is automatically performed according to the image restoration data to obtain an anti-tampering image.
可选地,获取待检测图像,并对所述待检测图像进行检测预处理,得到待检测图像信息之前,还包括:Optionally, before acquiring the image to be detected and performing detection preprocessing on the image to be detected to obtain information of the image to be detected, the method further includes:
对原始图像进行图像信息提取,得到所述原始图像的第一有效位平面信息;Extracting image information from the original image to obtain first valid bit plane information of the original image;
获取编码平面信息并结合所述第一有效位平面信息,得到原始图像的校验信息;Acquire coding plane information and combine it with the first valid bit plane information to obtain verification information of the original image;
根据预设密钥数据获取所述原始图像的恢复信息,并与所述原始图像的校验信息进行整合,得到所述原始图像的功能平面信息;Acquire the restoration information of the original image according to the preset key data, and integrate it with the verification information of the original image to obtain the functional plane information of the original image;
将所述第一有效位平面信息、所述功能平面信息以及所述编码平面信息依次整合到所述原始图像中,得到防篡改图像。The first valid bit plane information, the functional plane information and the coding plane information are sequentially integrated into the original image to obtain an anti-tampering image.
可选地,获取编码平面信息并结合所述第一有效位平面信息,得到原始图像的校验信息,具体步骤包括:Optionally, the coding plane information is acquired and combined with the first valid bit plane information to obtain verification information of the original image, and the specific steps include:
根据预设图像编码算法得到所述编码平面信息;Obtaining the coding plane information according to a preset image coding algorithm;
根据所述第一有效位平面信息和所述编码平面信息生成原始图像的校验信息。The check information of the original image is generated according to the first valid bit plane information and the coding plane information.
可选地,获取待检测图像,并对所述待检测图像进行检测预处理,得到待检测图像信息,具体步骤包括:Optionally, obtaining an image to be detected and performing detection preprocessing on the image to be detected to obtain information of the image to be detected, the specific steps include:
获取待检测图像,并将所述待检测图像按照预设规格进行图像拆分,得到待检测子图像集合;Acquire an image to be detected, and split the image to be detected according to preset specifications to obtain a set of sub-images to be detected;
对所述待检测子图像集合中的每一个待检测子图像分别进行初始校验位提取,得到待检测图像的校验信息;Extracting initial check bits from each sub-image to be detected in the sub-image set to obtain check information of the image to be detected;
将待检测图像的校验信息与待检测图像的恢复信息进行整合,得到所述待检测图像信息。The verification information of the image to be detected is integrated with the restoration information of the image to be detected to obtain the image information to be detected.
可选地,对所述待检测图像信息进行检测,得到图像检测结果,具体步骤包括:Optionally, the image information to be detected is detected to obtain an image detection result, and the specific steps include:
根据所述待检测图像得到待检测图像的比较信息;Obtaining comparison information of the image to be detected according to the image to be detected;
将待检测图像的校验信息与所述待检测图像的比较信息进行遍历比对,得到初始图像检测结果;The verification information of the image to be detected is compared with the comparison information of the image to be detected to obtain an initial image detection result;
对所述初始图像检测结果进行形态学操作处理,得到所述图像检测结果。The initial image detection result is processed by morphological operation to obtain the image detection result.
可选地,根据所述图像篡改信息进行数据处理,得到对应的图像复原数据,并自动根据所述图像复原数据进行图像恢复,得到防篡改图像,具体步骤包括:Optionally, data processing is performed according to the image tampering information to obtain corresponding image restoration data, and image restoration is automatically performed according to the image restoration data to obtain an anti-tampering image. The specific steps include:
根据所述图像篡改信息确定图像篡改位置信息;Determine the image tampering position information according to the image tampering information;
基于所述图像篡改位置信息进行图像编码系数恢复,得到对应的图像复原数据;Perform image coding coefficient recovery based on the image tampering position information to obtain corresponding image restoration data;
通过所述图像复原数据对图像篡改位置进行图像修复,得到所述防篡改图像。The image tampering position is repaired using the image restoration data to obtain the tamper-proof image.
可选地,基于所述图像篡改位置信息进行图像编码系数恢复,得到对应的图像复原数据,具体步骤包括:Optionally, image coding coefficients are restored based on the image tampering position information to obtain corresponding image restoration data, and the specific steps include:
根据所述图像篡改位置信息进行图像编码数据清洗,得到待修复图像编码系数;Cleaning the image coding data according to the image tampering position information to obtain the image coding coefficient to be repaired;
基于编码恢复算法对所述待修复图像编码系数进行恢复,得到对应的图像复原数据。The coding coefficients of the image to be repaired are restored based on a coding restoration algorithm to obtain corresponding image restoration data.
此外,为实现上述目的,本发明还提出一种图像篡改检测与自恢复装置,所述图像篡改检测与自恢复装置包括:In addition, to achieve the above-mentioned purpose, the present invention also proposes an image tampering detection and self-recovery device, the image tampering detection and self-recovery device comprising:
信息提取模块:获取待检测图像,并对所述待检测图像进行检测预处理,得到待检测图像信息;Information extraction module: obtains the image to be detected, and performs detection preprocessing on the image to be detected to obtain the information of the image to be detected;
检测比对模块:对所述待检测图像信息进行检测,得到图像检测结果;Detection and comparison module: detects the image information to be detected and obtains the image detection result;
比对异常模块:若所述图像检测结果为异常时,对所述图像检测结果进行解析,得到图像篡改信息;Abnormal comparison module: if the image detection result is abnormal, the image detection result is analyzed to obtain image tampering information;
图像修复模块:根据所述图像篡改信息进行数据处理,得到对应的图像复原数据,并自动根据所述图像复原数据进行图像恢复,得到防篡改图像。Image restoration module: performs data processing according to the image tampering information to obtain corresponding image restoration data, and automatically restores the image according to the image restoration data to obtain an anti-tampering image.
此外,为实现上述目的,本发明还提出一种图像篡改检测与自恢复设备,所述图像篡改检测与自恢复设备包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的图像篡改检测与自恢复程序,所述图像篡改检测与自恢复程序配置为实现如上文所述的图像篡改检测与自恢复方法的步骤。In addition, to achieve the above-mentioned objectives, the present invention also proposes an image tampering detection and self-recovery device, which includes: a memory, a processor, and an image tampering detection and self-recovery program stored on the memory and runnable on the processor, wherein the image tampering detection and self-recovery program is configured to implement the steps of the image tampering detection and self-recovery method described above.
此外,为实现上述目的,本发明还提出一种存储有计算机程序的计算机可读存储介质,所述存储介质上存储有图像篡改检测与自恢复程序,所述图像篡改检测与自恢复程序被处理器执行时实现如上文所述的图像篡改检测与自恢复方法的步骤。In addition, to achieve the above-mentioned purpose, the present invention also proposes a computer-readable storage medium storing a computer program, wherein the storage medium stores an image tampering detection and self-recovery program, and when the image tampering detection and self-recovery program is executed by a processor, the steps of the image tampering detection and self-recovery method described above are implemented.
本发明通过获取待检测图像,并对待检测图像进行检测预处理,得到待检测图像信息;对待检测图像信息进行检测,得到图像检测结果;若图像检测结果为异常时,对图像检测结果进行解析,得到图像篡改信息;根据图像篡改信息进行数据处理,得到对应的图像复原数据,并自动根据图像复原数据进行图像恢复,得到防篡改图像。本发明通过对待检测图像进行篡改检测,从而得到图像篡改信息,再根据图像篡改信息和相应的数据处理操作得到图像复原数据,并最终复原得到未被篡改的图像,实现了对图像篡改的准确检测,以及使被篡改的图像能够重新复原至未被篡改的状态。The present invention obtains the image to be detected, performs detection preprocessing on the image to be detected, obtains the image information to be detected; detects the image information to be detected, obtains the image detection result; if the image detection result is abnormal, analyzes the image detection result to obtain the image tampering information; performs data processing according to the image tampering information to obtain the corresponding image restoration data, and automatically restores the image according to the image restoration data to obtain the tamper-proof image. The present invention performs tampering detection on the image to be detected, thereby obtaining the image tampering information, and then obtains the image restoration data according to the image tampering information and the corresponding data processing operation, and finally restores the image that has not been tampered with, thereby realizing accurate detection of image tampering and restoring the tampered image to a state that has not been tampered with.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1是本发明实施例方案涉及的硬件运行环境的图像篡改检测与自恢复设备的结构示意图;1 is a schematic diagram of the structure of an image tampering detection and self-recovery device in a hardware operating environment according to an embodiment of the present invention;
图2为本发明图像篡改检测与自恢复方法第一实施例的流程示意图;FIG2 is a schematic diagram of a flow chart of a first embodiment of an image tampering detection and self-recovery method according to the present invention;
图3为本发明图像篡改检测与自恢复方法第二实施例的流程示意图;FIG3 is a flow chart of a second embodiment of the image tampering detection and self-recovery method of the present invention;
图4为本发明图像篡改检测与自恢复方法第三实施例的流程示意图;FIG4 is a flow chart of a third embodiment of the image tampering detection and self-recovery method of the present invention;
图5为本发明图像篡改检测与自恢复方法第四实施例的流程示意图;FIG5 is a flow chart of a fourth embodiment of the image tampering detection and self-recovery method of the present invention;
图6为本发明图像篡改检测与自恢复装置第一实施例的结构框图。FIG. 6 is a structural block diagram of the first embodiment of the image tampering detection and self-recovery device of the present invention.
本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。The realization of the purpose, functional features and advantages of the present invention will be further explained in conjunction with embodiments and with reference to the accompanying drawings.
具体实施方式Detailed ways
应当理解,此处所描述的具体实施例仅用以解释本发明,并不用于限定本发明。It should be understood that the specific embodiments described herein are only used to explain the present invention, and are not used to limit the present invention.
参照图1,图1为本发明实施例方案涉及的硬件运行环境的图像篡改检测与自恢复设备结构示意图。Refer to FIG. 1 , which is a schematic diagram of the structure of an image tampering detection and self-recovery device in a hardware operating environment according to an embodiment of the present invention.
如图1所示,该图像篡改检测与自恢复设备可以包括:处理器1001,例如中央处理器(Central Processing Unit,CPU),通信总线1002、用户接口1003,网络接口1004,存储器1005。其中,通信总线1002用于实现这些组件之间的连接通信。用户接口1003可以包括显示屏(Display)、输入单元比如键盘(Keyboard),可选用户接口1003还可以包括标准的有线接口、无线接口。网络接口1004可选的可以包括标准的有线接口、无线接口(如无线保真(Wireless-Fidelity,Wi-Fi)接口)。存储器1005可以是高速的随机存取存储器(RandomAccess Memory,RAM),也可以是稳定的非易失性存储器(Non-Volatile Memory,NVM),例如磁盘存储器。存储器1005可选的还可以是独立于前述处理器1001的存储装置。As shown in FIG1 , the image tampering detection and self-recovery device may include: a processor 1001, such as a central processing unit (CPU), a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Among them, the communication bus 1002 is used to realize the connection and communication between these components. The user interface 1003 may include a display screen (Display), an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface. The network interface 1004 may optionally include a standard wired interface and a wireless interface (such as a wireless fidelity (Wireless-Fidelity, Wi-Fi) interface). The memory 1005 may be a high-speed random access memory (Random Access Memory, RAM) or a stable non-volatile memory (Non-Volatile Memory, NVM), such as a disk storage. The memory 1005 may also be a storage device independent of the aforementioned processor 1001.
本领域技术人员可以理解,图1中示出的结构并不构成对图像篡改检测与自恢复设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。Those skilled in the art will appreciate that the structure shown in FIG. 1 does not constitute a limitation on the image tampering detection and self-recovery device, and may include more or fewer components than shown in the figure, or a combination of certain components, or a different arrangement of components.
如图1所示,作为一种存储介质的存储器1005中可以包括操作系统、网络通信模块、用户接口模块以及图像篡改检测与自恢复程序。As shown in FIG. 1 , the memory 1005 as a storage medium may include an operating system, a network communication module, a user interface module, and an image tampering detection and self-recovery program.
在图1所示的图像篡改检测与自恢复设备中,网络接口1004主要用于与网络服务器进行数据通信;用户接口1003主要用于与用户进行数据交互;本发明图像篡改检测与自恢复设备中的处理器1001、存储器1005可以设置在图像篡改检测与自恢复设备中,所述图像篡改检测与自恢复设备通过处理器1001调用存储器1005中存储的图像篡改检测与自恢复程序,并执行本发明实施例提供的图像篡改检测与自恢复方法。In the image tampering detection and self-recovery device shown in Figure 1, the network interface 1004 is mainly used for data communication with the network server; the user interface 1003 is mainly used for data interaction with the user; the processor 1001 and the memory 1005 in the image tampering detection and self-recovery device of the present invention can be set in the image tampering detection and self-recovery device, and the image tampering detection and self-recovery device calls the image tampering detection and self-recovery program stored in the memory 1005 through the processor 1001, and executes the image tampering detection and self-recovery method provided by the embodiment of the present invention.
本发明实施例提供了一种图像篡改检测与自恢复方法,参照图2,图2为本发明一种图像篡改检测与自恢复方法第一实施例的流程示意图。An embodiment of the present invention provides an image tampering detection and self-recovery method. Referring to FIG. 2 , FIG. 2 is a flow chart of a first embodiment of an image tampering detection and self-recovery method of the present invention.
本实施例中,所述图像篡改检测与自恢复方法包括以下步骤:In this embodiment, the image tampering detection and self-recovery method includes the following steps:
步骤S10:获取待检测图像,并对待检测图像进行检测预处理,得到待检测图像信息;Step S10: Acquire the image to be detected, and perform detection preprocessing on the image to be detected to obtain information of the image to be detected;
需要说明的是,在具体实现中,待检测图像实质是指可能被篡改过的防篡改图像。It should be noted that, in a specific implementation, the image to be detected actually refers to an anti-tampering image that may have been tampered with.
步骤S20:对待检测图像信息进行检测,得到图像检测结果;Step S20: Detect the image information to be detected to obtain an image detection result;
需要说明的是,检测具体作用是根据待检测图像信息对待检测图像是否遭遇过图像篡改进行判断。并且当待检测图像确定被篡改时,得到的图像检测结果会包括有被篡改图像的具体篡改信息。It should be noted that the specific function of the detection is to determine whether the image to be detected has been tampered with based on the image information to be detected. And when the image to be detected is determined to be tampered with, the image detection result obtained will include the specific tampering information of the tampered image.
步骤S30:若图像检测结果为异常时,对图像检测结果进行解析,得到图像篡改信息;Step S30: if the image detection result is abnormal, the image detection result is analyzed to obtain image tampering information;
可以理解的是,图像检测结果为异常表明该图像遭遇过篡改,此时对图像检测结果进行解析可以得到该图像被篡改的具体位置信息。并且,图像检测结果为正常,则表明该图像未遭遇过篡改。It is understandable that if the image detection result is abnormal, it means that the image has been tampered with. At this time, the specific location information of the image tampered with can be obtained by analyzing the image detection result. In addition, if the image detection result is normal, it means that the image has not been tampered with.
还需说明的是,在具体实现中,图像检测结果还可为正常即该图像未被篡改,此时只需输出正常的图像检测结果而无需进行图像篡改恢复。It should also be noted that, in a specific implementation, the image detection result may also be normal, that is, the image has not been tampered with. In this case, it is only necessary to output the normal image detection result without performing image tampering recovery.
步骤S40:根据图像篡改信息进行数据处理,得到对应的图像复原数据,并自动根据图像复原数据进行图像恢复,得到防篡改图像。Step S40: performing data processing according to the image tampering information to obtain corresponding image restoration data, and automatically performing image restoration according to the image restoration data to obtain an anti-tampering image.
需要说明的是,在具体实现中,图像复原数据具体是指图像未被篡改时对应的编码系数,其具体生成过程是:先利用多级树集合分裂编码算法生成图像对应的编码平面,再将得到的编码平面与预设的密钥矩阵进行矩阵相乘从而构建得到相应的线性方程组,其中该线性方程组矩阵相乘的结果即为编码系数。It should be noted that, in the specific implementation, the image restoration data specifically refers to the coding coefficients corresponding to the image when it has not been tampered with, and its specific generation process is: first use the multi-level tree set splitting coding algorithm to generate the coding plane corresponding to the image, and then perform matrix multiplication of the obtained coding plane with the preset key matrix to construct the corresponding linear equation group, where the result of the matrix multiplication of the linear equation group is the coding coefficient.
本实施例通过获取待检测图像,并对待检测图像进行检测预处理,得到待检测图像信息;对待检测图像信息进行检测,得到图像检测结果;若图像检测结果为异常时,对图像检测结果进行解析,得到图像篡改信息;根据图像篡改信息进行数据处理,得到对应的图像复原数据,并自动根据图像复原数据进行图像恢复,得到防篡改图像。本实施例通过对待检测图像进行篡改检测,从而得到图像篡改信息,再根据图像篡改信息和相应的数据处理操作得到图像复原数据,并最终复原得到未被篡改的图像,实现了对图像篡改的准确检测,以及使被篡改的图像能够重新复原至未被篡改的状态。This embodiment obtains the image to be detected and performs detection preprocessing on the image to be detected to obtain the image information to be detected; detects the image information to be detected to obtain the image detection result; if the image detection result is abnormal, analyzes the image detection result to obtain the image tampering information; performs data processing according to the image tampering information to obtain the corresponding image restoration data, and automatically restores the image according to the image restoration data to obtain the tamper-proof image. This embodiment performs tampering detection on the image to be detected to obtain the image tampering information, and then obtains the image restoration data according to the image tampering information and the corresponding data processing operation, and finally restores the image that has not been tampered with, thereby realizing accurate detection of image tampering and restoring the tampered image to a state that has not been tampered with.
参考图3,图3为本发明一种图像篡改检测与自恢复方法第二实施例的流程示意图。Refer to FIG. 3 , which is a flow chart of a second embodiment of an image tampering detection and self-recovery method according to the present invention.
基于上述第一实施例,在本实施例中,所述步骤S10之前还包括:Based on the first embodiment above, in this embodiment, before step S10, the following steps are further included:
步骤S00:对原始图像进行图像信息提取,得到原始图像的第一有效位平面信息;Step S00: extracting image information from the original image to obtain the first valid bit plane information of the original image;
需要说明的是,在具体实现中,原始图像的第一有效位平面信息即为原始图像的最高有效位平面信息,其具体是通过提取原始图像中每个像素的最高有效位,从而形成最高有效位平面得到的。其中,最高有效位是指一个二进制数字中最高值的比特。It should be noted that, in a specific implementation, the first significant bit plane information of the original image is the most significant bit plane information of the original image, which is obtained by extracting the most significant bit of each pixel in the original image to form the most significant bit plane. The most significant bit refers to the bit with the highest value in a binary number.
步骤S01:获取编码平面信息并结合第一有效位平面信息,得到原始图像的校验信息;Step S01: Obtain coding plane information and combine it with the first valid bit plane information to obtain verification information of the original image;
需要说明的是,编码平面信息的获取具体是通过多级树集合分裂编码算法生成原始图像对应的编码平面来实现的。It should be noted that the acquisition of the coding plane information is specifically achieved by generating the coding plane corresponding to the original image through a multi-level tree set splitting coding algorithm.
还需说明的是,在具体实现中,原始图像的校验信息生成过程是,先将原始图像的编码平面和原始图像的最高有效位平面分割成相同大小的图像块,再利用哈希算法为每个图像块生成相应的校验位,所有的校验位组成了原始图像的校验信息。其中哈希算法是指,将任意长度的二进制值串映射为固定长度的二进制值串,这个映射的规则就是哈希算法,而通过原始数据映射之后得到的二进制值串就是哈希值。It should also be noted that in the specific implementation, the process of generating the check information of the original image is to first divide the coding plane of the original image and the most significant bit plane of the original image into image blocks of the same size, and then use the hash algorithm to generate corresponding check bits for each image block. All check bits constitute the check information of the original image. The hash algorithm refers to mapping a binary value string of any length to a binary value string of fixed length. The mapping rule is the hash algorithm, and the binary value string obtained after mapping the original data is the hash value.
步骤S02:根据预设密钥数据获取原始图像的恢复信息,并与原始图像的校验信息进行整合,得到原始图像的功能平面信息;Step S02: obtaining the restoration information of the original image according to the preset key data, and integrating it with the verification information of the original image to obtain the functional plane information of the original image;
需要说明的是,预设密钥数据是指由用户设定的一种密钥矩阵;原始图像的恢复信息具体是通过密钥矩阵与编码平面进行矩阵相乘获得的,这种发生也可视为一种线性方程组的构建过程;其中,被篡改的编码信息作为未知数,可以通过求解该线性方程组来获取。It should be noted that the preset key data refers to a key matrix set by the user; the recovery information of the original image is specifically obtained by matrix multiplication of the key matrix and the coding plane, which can also be regarded as a process of constructing a set of linear equations; wherein the tampered coding information is an unknown variable and can be obtained by solving the set of linear equations.
步骤S03:将第一有效位平面信息、功能平面信息以及编码平面信息依次整合到原始图像中,得到防篡改图像。Step S03: Integrate the first valid bit plane information, the function plane information and the coding plane information into the original image in sequence to obtain an anti-tampering image.
可以理解的是,将第一有效位平面信息、功能平面信息以及编码平面信息依次整合到原始图像中实质上是将水印嵌入到原始图像中,从而得到防篡改图像,这种方式确保了对原始图像进行隐秘性水印嵌入的同时,具备了有效的检测和恢复机制。It can be understood that integrating the first valid bit plane information, functional plane information and coding plane information into the original image in sequence is essentially embedding the watermark into the original image to obtain a tamper-proof image. This method ensures that the original image is embedded with a secret watermark while having an effective detection and recovery mechanism.
本实施例通过对原始图像进行多重信息处理分别得到原始图像的第一有效位平面信息、功能平面信息以及编码平面信息,进而再将这些信息依次整合到原始图像中,从而实现了对原始图像进行加密水印的嵌入操作,为后续进行图像的篡改检测以及篡改恢复提高了操作基础。This embodiment performs multiple information processing on the original image to obtain the first valid bit plane information, functional plane information and coding plane information of the original image, and then integrates these information into the original image in sequence, thereby realizing the embedding operation of the encrypted watermark on the original image, which improves the operational basis for subsequent image tampering detection and tampering recovery.
进一步地,获取编码平面信息并结合所述第一有效位平面信息,得到原始图像的校验信息,具体步骤包括:根据预设图像编码算法得到编码平面信息;根据第一有效位平面信息和编码平面信息生成原始图像的校验信息。Furthermore, the coding plane information is obtained and combined with the first valid bit plane information to obtain verification information of the original image. The specific steps include: obtaining the coding plane information according to a preset image coding algorithm; and generating verification information of the original image according to the first valid bit plane information and the coding plane information.
可以理解的是,预设图像编码算法具体是指一种空间图像压缩算法,在具体实现中,具体可是指多级树集合分裂编码算法。It can be understood that the preset image coding algorithm specifically refers to a spatial image compression algorithm, and in a specific implementation, it may specifically refer to a multi-level tree set splitting coding algorithm.
参考图4,图4为本发明一种图像篡改检测与自恢复方法第三实施例的流程示意图。Refer to FIG. 4 , which is a flow chart of a third embodiment of an image tampering detection and self-recovery method according to the present invention.
基于上述第一实施例,在本实施例中,所述步骤S10具体步骤包括:Based on the above first embodiment, in this embodiment, the specific steps of step S10 include:
步骤S11:获取待检测图像,并将待检测图像按照预设规格进行图像拆分,得到待检测子图像集合;Step S11: obtaining an image to be detected, and splitting the image to be detected according to preset specifications to obtain a set of sub-images to be detected;
需要说明的是,预设规格具体是由用户提前设定划分成的图像块大小,在对待检测图像进行检测时,需要先将待检测图像拆分为预设规格大小的图像块,这些图像块即为待检测子图像集合。It should be noted that the preset specifications are specifically the image block sizes set in advance by the user. When detecting an image to be detected, the image to be detected needs to be split into image blocks of preset specifications. These image blocks are the set of sub-images to be detected.
步骤S12:对待检测子图像集合中的每一个待检测子图像分别进行初始校验位提取,得到待检测图像的校验信息;Step S12: extracting initial check bits from each sub-image to be detected in the sub-image set to obtain check information of the image to be detected;
可以理解的是,在具体实现中,待检测图像的校验信息具体是由待检测子图像集合中的各个图像块对应的校验位数据整合得到的,在进行图像检测时,会逐个比对各个图像块对应的校验位数据,从而确定图像是否遭遇篡改以及若图像被篡改,图像的篡改位置在什么位置。It can be understood that in a specific implementation, the verification information of the image to be detected is specifically obtained by integrating the verification bit data corresponding to each image block in the set of sub-images to be detected. When performing image detection, the verification bit data corresponding to each image block will be compared one by one to determine whether the image has been tampered with and if the image has been tampered with, where the tampered location of the image is.
步骤S13:将待检测图像的校验信息与待检测图像的恢复信息进行整合,得到待检测图像信息。Step S13: Integrate the verification information of the image to be detected and the restoration information of the image to be detected to obtain the image information to be detected.
需要说明的是,待检测图像的恢复信息具体是用于恢复因篡改而丢失的编码信息,即通过待检测图像的恢复信息可以还原得到图像篡改部分的编码信息。It should be noted that the restored information of the image to be detected is specifically used to restore the coded information lost due to tampering, that is, the coded information of the tampered part of the image can be restored through the restored information of the image to be detected.
本实施例先将待检测图像拆分为多个待检测子图像,再分别提取这些待检测子图像对应的校验位数据并将其与待检测图像的恢复信息进行整合,得到待检测图像信息,为后续进行图像篡改检测提供了比对参照。In this embodiment, the image to be detected is first split into multiple sub-images to be detected, and then the check bit data corresponding to these sub-images to be detected are respectively extracted and integrated with the recovery information of the image to be detected to obtain the image information to be detected, which provides a comparison reference for subsequent image tampering detection.
进一步地,对所述待检测图像信息进行检测,得到图像检测结果,具体步骤包括:根据待检测图像得到待检测图像的比较信息;将待检测图像的校验信息与待检测图像的比较信息进行遍历比对,得到初始图像检测结果;对初始图像检测结果进行形态学操作处理,得到图像检测结果。Furthermore, the image information to be detected is detected to obtain an image detection result, and the specific steps include: obtaining comparison information of the image to be detected based on the image to be detected; traversing and comparing the verification information of the image to be detected with the comparison information of the image to be detected to obtain an initial image detection result; performing morphological operation processing on the initial image detection result to obtain an image detection result.
可以理解的是,待检测图像的比较信息的生成方式具体是,利用哈希算法为划分得到的每个图像块生成相应的比较位数据,这些比较位数据即为待检测图像的比较信息。It can be understood that the comparison information of the image to be detected is generated by using a hash algorithm to generate corresponding comparison bit data for each image block obtained by division, and these comparison bit data are the comparison information of the image to be detected.
还需说明的是,图像检测结果是在初始图像检测结果上进一步细化和增强得到的,即图像检测结果会更加灵敏、准确;形态学操作处理具体是根据图像形状进行的简单操作,一般情况下是对二值化图像进行的操作,例如,膨胀、腐蚀等。It should also be noted that the image detection results are obtained by further refining and enhancing the initial image detection results, that is, the image detection results will be more sensitive and accurate; morphological operation processing is a simple operation performed based on the image shape, which is generally an operation performed on a binary image, such as dilation, erosion, etc.
参考图5,图5为本发明一种图像篡改检测与自恢复方法第四实施例的流程示意图。Refer to FIG. 5 , which is a flow chart of a fourth embodiment of an image tampering detection and self-recovery method according to the present invention.
基于上述第一实施例,在本实施例中,所述步骤S40具体步骤包括:Based on the above first embodiment, in this embodiment, the specific steps of step S40 include:
步骤S41:根据图像篡改信息确定图像篡改位置信息;Step S41: determining image tampering position information according to the image tampering information;
可以理解的是,在具体实现中根据图像篡改信息可以确定出图像的哪些像素块遭到篡改,即图像篡改位置信息。It can be understood that in a specific implementation, which pixel blocks of the image have been tampered with can be determined based on the image tampering information, that is, the image tampering position information.
步骤S42:基于图像篡改位置信息进行图像编码系数恢复,得到图像复原数据;Step S42: restoring the image coding coefficients based on the image tampering position information to obtain image restoration data;
需要说明的是,图像编码系数恢复具体是通过高斯消元法实现的,在具体实现中,先将受到篡改的图像编码系数视为待求解的未知数,然后确定该待求解的未知数所对应的密钥系数,并将其作为线性方程组的系数;再根据差值计算公式计算出差值,作为线性方程组的常数项;最后通过精确求解该线性方程组,从而恢复被篡改的编码系数。It should be noted that the image coding coefficient recovery is specifically implemented through the Gaussian elimination method. In the specific implementation, the tampered image coding coefficient is first regarded as an unknown to be solved, and then the key coefficient corresponding to the unknown to be solved is determined, and used as the coefficient of the linear equation system; the difference is then calculated according to the difference calculation formula as the constant term of the linear equation system; finally, the tampered coding coefficient is restored by accurately solving the linear equation system.
步骤S43:通过图像复原数据对图像篡改位置进行图像修复,得到防篡改图像。Step S43: Perform image repair on the image tampering position using the image restoration data to obtain an anti-tampering image.
需要说明的是,在具体实现中,在恢复所有的编码系数即得到图像复原数据之后,可通过多级树集合分裂解码算法对图像进行精确解码,以使被图像恢复至篡改前的状态。It should be noted that, in a specific implementation, after all coding coefficients are restored, that is, image restoration data is obtained, the image can be accurately decoded using a multi-level tree set splitting decoding algorithm to restore the image to its state before tampering.
还需说明的是,在具体实现中,为了提高图像恢复的质量,会对图像进行精确重建,即仅对受篡改的区域进行图像替换,而其余部分则保留原始数据。It should also be noted that, in a specific implementation, in order to improve the quality of image restoration, the image will be accurately reconstructed, that is, only the tampered area will be replaced, while the original data will be retained in the rest.
本实施例先确定图像被篡改的具体位置,再对图像被篡改位置进行图像编码系数恢复得到图像复原数据,进而实现对图像篡改位置的图像修复,得到防篡改图像。This embodiment first determines the specific location where the image has been tampered with, then recovers the image coding coefficients at the tampered location to obtain image restoration data, and then implements image repair at the tampered location to obtain an anti-tampering image.
进一步地,基于所述图像篡改位置信息进行图像编码系数恢复,得到对应的图像复原数据,具体步骤包括:根据图像篡改位置信息进行图像编码数据清洗,得到待修复图像编码系数;基于编码恢复算法对待修复图像编码系数进行恢复,得到图像复原数据。Furthermore, image coding coefficients are restored based on the image tampering position information to obtain corresponding image restoration data. The specific steps include: cleaning the image coding data according to the image tampering position information to obtain the image coding coefficients to be repaired; restoring the image coding coefficients to be repaired based on a coding recovery algorithm to obtain image restoration data.
需要说明的是,在具体实现中,图像编码系数恢复过程具体可为,首先对于编码系数的每一列,需精确移除受篡改的部分,仅保留未受篡改的系数;然后,再相应地删除预设密钥中对应的行数,进行差值计算;最后借助高斯消元法的理论精确计算出未知数即待恢复的图像编码系数。其中差值计算的具体公式为:It should be noted that in the specific implementation, the image coding coefficient recovery process can be specifically as follows: first, for each column of the coding coefficient, the tampered part needs to be accurately removed, and only the coefficient that has not been tampered with is retained; then, the corresponding number of rows in the preset key is deleted accordingly, and the difference calculation is performed; finally, the unknown number, that is, the image coding coefficient to be restored, is accurately calculated using the theory of Gaussian elimination. The specific formula for the difference calculation is:
式中,C_R_column为单列删除掉被篡改部分的恢复数据,C_KS为删除掉篡改数据行数的密钥矩阵,C_E_column为单列编码系数未被篡改的部分。Where C_R_column is the recovered data with the tampered part deleted from a single column, C_K S is the key matrix with the number of rows of tampered data deleted, and C_E_column is the untampered part of the single column encoding coefficient.
此外,本发明实施例还提出一种存储有计算机程序的计算机可读存储介质,所述存储介质上存储有图像篡改检测与自恢复程序,所述图像篡改检测与自恢复程序被处理器执行时实现如上文所述的图像篡改检测与自恢复方法的步骤。In addition, an embodiment of the present invention also proposes a computer-readable storage medium storing a computer program, wherein an image tampering detection and self-recovery program is stored on the storage medium, and when the image tampering detection and self-recovery program is executed by a processor, the steps of the image tampering detection and self-recovery method described above are implemented.
由于本存储介质采用了上述所有实施例的全部技术方案,因此至少有上述实施例的技术方案所带来的所有有益效果,在此不再一一赘述。Since the storage medium adopts all the technical solutions of all the above embodiments, it has at least all the beneficial effects brought by the technical solutions of the above embodiments, which will not be described one by one here.
参照图6,图6为本发明图像篡改检测与自恢复装置第一实施例的结构框图。Refer to FIG. 6 , which is a structural block diagram of a first embodiment of an image tampering detection and self-recovery device according to the present invention.
如图6所示,本发明实施例提出的图像篡改检测与自恢复装置包括:As shown in FIG6 , the image tampering detection and self-recovery device proposed in the embodiment of the present invention includes:
信息提取模块10:获取待检测图像,并对待检测图像进行检测预处理,得到待检测图像信息;Information extraction module 10: obtains the image to be detected, and performs detection preprocessing on the image to be detected to obtain information of the image to be detected;
检测比对模块20:对待检测图像信息进行检测,得到图像检测结果;Detection and comparison module 20: detects the image information to be detected and obtains the image detection result;
比对异常模块30:若图像检测结果为异常时,对图像检测结果进行解析,得到图像篡改信息;Anomaly comparison module 30: if the image detection result is abnormal, the image detection result is analyzed to obtain image tampering information;
图像修复模块40:根据图像篡改信息进行数据处理,得到图像复原数据,并根据图像复原数据进行图像恢复,得到防篡改图像。Image restoration module 40: performs data processing according to the image tampering information to obtain image restoration data, and performs image restoration according to the image restoration data to obtain an anti-tampering image.
本实施例通过获取待检测图像,并对待检测图像进行检测预处理,得到待检测图像信息;对待检测图像信息进行检测,得到图像检测结果;若图像检测结果为异常时,对图像检测结果进行解析,得到图像篡改信息;根据图像篡改信息进行数据处理,得到对应的图像复原数据,并自动根据图像复原数据进行图像恢复,得到防篡改图像。本实施例通过对待检测图像进行篡改检测,从而得到图像篡改信息,再根据图像篡改信息和相应的数据处理操作得到图像复原数据,并最终复原得到未被篡改的图像,实现了对图像篡改的准确检测,以及使被篡改的图像能够重新复原至未被篡改的状态。This embodiment obtains the image to be detected and performs detection preprocessing on the image to be detected to obtain the image information to be detected; detects the image information to be detected to obtain the image detection result; if the image detection result is abnormal, analyzes the image detection result to obtain the image tampering information; performs data processing according to the image tampering information to obtain the corresponding image restoration data, and automatically restores the image according to the image restoration data to obtain the tamper-proof image. This embodiment performs tampering detection on the image to be detected to obtain the image tampering information, and then obtains the image restoration data according to the image tampering information and the corresponding data processing operation, and finally restores the image that has not been tampered with, thereby realizing accurate detection of image tampering and restoring the tampered image to a state that has not been tampered with.
应当理解的是,以上仅为举例说明,对本发明的技术方案并不构成任何限定,在具体应用中,本领域的技术人员可以根据需要进行设置,本发明对此不做限制。It should be understood that the above is only an example and does not constitute any limitation on the technical solution of the present invention. In specific applications, technicians in this field can make settings as needed, and the present invention does not limit this.
需要说明的是,以上所描述的工作流程仅仅是示意性的,并不对本发明的保护范围构成限定,在实际应用中,本领域的技术人员可以根据实际的需要选择其中的部分或者全部来实现本实施例方案的目的,此处不做限制。It should be noted that the workflow described above is merely illustrative and does not limit the scope of protection of the present invention. In practical applications, technicians in this field can select part or all of them according to actual needs to achieve the purpose of the present embodiment, and no limitation is made here.
另外,未在本实施例中详尽描述的技术细节,可参见本发明任意实施例所提供的图像篡改检测与自恢复方法,此处不再赘述。In addition, for technical details not fully described in this embodiment, reference may be made to the image tampering detection and self-recovery method provided in any embodiment of the present invention, and will not be repeated here.
此外,需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者系统不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者系统所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者系统中还存在另外的相同要素。In addition, it should be noted that, in this article, the terms "include", "comprises" or any other variations thereof are intended to cover non-exclusive inclusion, so that a process, method, article or system including a series of elements includes not only those elements, but also includes other elements not explicitly listed, or also includes elements inherent to such process, method, article or system. In the absence of further restrictions, an element defined by the sentence "comprises a ..." does not exclude the existence of other identical elements in the process, method, article or system including the element.
上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。The serial numbers of the above embodiments of the present invention are only for description and do not represent the advantages or disadvantages of the embodiments.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如只读存储器(Read Only Memory,ROM)/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例所述的方法。Through the description of the above implementation methods, those skilled in the art can clearly understand that the above-mentioned embodiment methods can be implemented by means of software plus a necessary general hardware platform, and of course by hardware, but in many cases the former is a better implementation method. Based on such an understanding, the technical solution of the present invention, or the part that contributes to the prior art, can be embodied in the form of a software product, which is stored in a storage medium (such as a read-only memory (ROM)/RAM, a magnetic disk, or an optical disk), and includes a number of instructions for enabling a terminal device (which can be a mobile phone, a computer, a server, or a network device, etc.) to execute the methods described in each embodiment of the present invention.
以上仅为本发明的优选实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。The above are only preferred embodiments of the present invention, and are not intended to limit the patent scope of the present invention. Any equivalent structure or equivalent process transformation made using the contents of the present invention specification and drawings, or directly or indirectly applied in other related technical fields, are also included in the patent protection scope of the present invention.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410040248.4A CN117830071A (en) | 2024-01-11 | 2024-01-11 | Image tampering detection and self-recovery method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410040248.4A CN117830071A (en) | 2024-01-11 | 2024-01-11 | Image tampering detection and self-recovery method, device, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117830071A true CN117830071A (en) | 2024-04-05 |
Family
ID=90520893
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410040248.4A Pending CN117830071A (en) | 2024-01-11 | 2024-01-11 | Image tampering detection and self-recovery method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117830071A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN119046903A (en) * | 2024-08-12 | 2024-11-29 | 澳门理工大学 | Artificial intelligence model parameter protection method, device, equipment and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030012406A1 (en) * | 2001-07-11 | 2003-01-16 | Canon Kabushiki Kaisha | Data processing method and apparatus |
KR20050040523A (en) * | 2003-10-29 | 2005-05-03 | 이원형 | Fragile watermarking for image tamper-proofing and authentication |
CN102196264A (en) * | 2010-03-16 | 2011-09-21 | 索尼公司 | Image coding apparatus and method, image decoding apparatus and method and program |
CN106408495A (en) * | 2015-11-06 | 2017-02-15 | 河南师范大学 | High PSNR fragile watermarking method based on chaos theory |
CN114493976A (en) * | 2022-04-15 | 2022-05-13 | 湖北微模式科技发展有限公司 | JPEG image tampering detection method based on fragile watermark |
CN114745475A (en) * | 2022-03-09 | 2022-07-12 | 西南交通大学 | Robust reversible information hiding method for encrypted image |
CN115439299A (en) * | 2022-08-29 | 2022-12-06 | 山东科技大学 | A Color Image Self-Recovery Method Based on 3D Reference Matrix |
CN116416112A (en) * | 2023-03-16 | 2023-07-11 | 重庆邮电大学 | A medical image self-recovery method based on image inpainting algorithm |
-
2024
- 2024-01-11 CN CN202410040248.4A patent/CN117830071A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030012406A1 (en) * | 2001-07-11 | 2003-01-16 | Canon Kabushiki Kaisha | Data processing method and apparatus |
KR20050040523A (en) * | 2003-10-29 | 2005-05-03 | 이원형 | Fragile watermarking for image tamper-proofing and authentication |
CN102196264A (en) * | 2010-03-16 | 2011-09-21 | 索尼公司 | Image coding apparatus and method, image decoding apparatus and method and program |
CN106408495A (en) * | 2015-11-06 | 2017-02-15 | 河南师范大学 | High PSNR fragile watermarking method based on chaos theory |
CN114745475A (en) * | 2022-03-09 | 2022-07-12 | 西南交通大学 | Robust reversible information hiding method for encrypted image |
CN114493976A (en) * | 2022-04-15 | 2022-05-13 | 湖北微模式科技发展有限公司 | JPEG image tampering detection method based on fragile watermark |
CN115439299A (en) * | 2022-08-29 | 2022-12-06 | 山东科技大学 | A Color Image Self-Recovery Method Based on 3D Reference Matrix |
CN116416112A (en) * | 2023-03-16 | 2023-07-11 | 重庆邮电大学 | A medical image self-recovery method based on image inpainting algorithm |
Non-Patent Citations (3)
Title |
---|
XIAOJUN TONG ET AL.: "A novel chaos-based fragile watermarking for image tampering detection and self-recovery", 《SIGNAL PROCESSING: IMAGE COMMUNICATION》, 23 December 2012 (2012-12-23), pages 301, XP028978850, DOI: 10.1016/j.image.2012.12.003 * |
XIU LIU ET AL.: "Secure Domain Based Compressed Sensing Image Secure Transmission and Tamper Restoration Method", 《2021 2ND INTERNATIONAL SEMINAR ON ARTIFICIAL INTELLIGENCE, NETWORKING AND INFORMATION TECHNOLOGY》, 31 December 2021 (2021-12-31), pages 1 - 5 * |
黄良永: "一种图像篡改可恢复的认证水印方法", 《计算机工程》, 31 March 2011 (2011-03-31), pages 1 - 2 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN119046903A (en) * | 2024-08-12 | 2024-11-29 | 澳门理工大学 | Artificial intelligence model parameter protection method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230360165A1 (en) | Method and apparatus for protecting digital photos from alteration | |
Swaminathan et al. | Robust and secure image hashing | |
US8189863B1 (en) | Watermarking digital documents | |
CN110245469B (en) | Webpage watermark generation method, watermark analysis method, device and storage medium | |
US10699358B2 (en) | Image hidden information detector | |
CN112085643B (en) | Image desensitization processing method, verification method and device, equipment and media | |
CN109785222B (en) | Method for quickly embedding and extracting information of webpage | |
CN110472128B (en) | Webpage evidence obtaining method and device based on image recognition, storage medium and server | |
CN117830071A (en) | Image tampering detection and self-recovery method, device, equipment and storage medium | |
CN113011254A (en) | Video data processing method, computer equipment and readable storage medium | |
Ali et al. | A meta-heuristic method for reassemble bifragmented intertwined JPEG image files in digital forensic investigation | |
WO2019095568A1 (en) | Enterprise abbreviation generation method and device, and storage medium | |
CN112017099B (en) | A method and system for hiding and parsing program code in images | |
CN118675215A (en) | Training method and device for face image generation model and computer equipment | |
CN116305294B (en) | Data leakage tracing method and device, electronic equipment and storage medium | |
CN118229499A (en) | A multi-mode quantum watermarking method, device, equipment and storage medium | |
CN115718696B (en) | Source code cryptography misuse detection method and device, electronic equipment and storage medium | |
CN117911227A (en) | Watermark processing method, device and storage medium | |
CN116403147A (en) | Network asset processing method, device, storage medium and electronic equipment | |
CN117058701A (en) | Method and device for analyzing electronic bill, computer equipment and storage medium | |
CN115643348A (en) | Verifiable safe natural steganography method and device based on reversible image processing network | |
CN114372169A (en) | Method, device and storage medium for searching homologous videos | |
CN118509433B (en) | Data privacy protection method and system based on cloud service platform | |
CN115510053B (en) | A data fingerprint embedding and extraction method and system | |
CN115809350B (en) | Contact search method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |