CN110276707B - A technical solution for image data protection and tamper detection - Google Patents
A technical solution for image data protection and tamper detection Download PDFInfo
- Publication number
- CN110276707B CN110276707B CN201810216047.XA CN201810216047A CN110276707B CN 110276707 B CN110276707 B CN 110276707B CN 201810216047 A CN201810216047 A CN 201810216047A CN 110276707 B CN110276707 B CN 110276707B
- Authority
- CN
- China
- Prior art keywords
- value
- watermark
- image data
- data protection
- tamper detection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
本发明涉及一种图像数据保护和篡改检测技术方案,是一种可以在开放网络环境下数字产品版权保护和数据安全维护的新技术。它充分利用了LBP的局部对比性特征,使用布尔函数f()和水印的其中一位进行比较,以实现在图像上嵌入或提取水印。通过探测和分析图像中嵌入的水印信息得到篡改提示,以减少网络图片遭受篡改攻击,使得数字水印保护网络图像安全性成为可能。该方案可应用于数字作品版权保护、篡改提示、通信覆盖、使用控制和电子商务等领域。其计算成本相对较低。The invention relates to a technical solution for image data protection and tampering detection, which is a new technology capable of digital product copyright protection and data security maintenance in an open network environment. It makes full use of the local contrast feature of LBP, using the Boolean function f( ) is compared with one of the watermarks to realize embedding or extracting watermarks on the image. By detecting and analyzing the watermark information embedded in the image to obtain tampering hints, it is possible to reduce the tampering attack of network pictures and make it possible for digital watermarks to protect the security of network images. The scheme can be applied to the fields of copyright protection of digital works, tampering reminder, communication coverage, use control and electronic commerce. Its computational cost is relatively low.
Description
技术领域technical field
发明涉及隐藏信息学,具体涉及一种空间水印技术。The invention relates to hidden information science, in particular to a space watermarking technology.
背景技术Background technique
因特网的日益普及及信息产业的飞速发展深刻地改变了我们的社会和日常生活,捕获、传输和存储数字数据非常简单和方便。 然而,这却产生了一个大问题:如何保护这些数据并防止它们被擅自修改。这个问题在其他领域也存在,如版权保护、内容认证、信息隐藏及通信覆盖。许多研究人员开发了各种数字水印算法来解决这个问题,他们打算在数字中嵌入一些秘密数据(称为水印)内容来标记或密封数字数据内容。水印嵌入宿主图像的原理是:嵌入引起的失真太小而不能被注意到。与此同时,嵌入的水印必须足够健壮以抵抗常见的退化或故意的攻击。The increasing popularity of the Internet and the rapid development of the information industry have profoundly changed our society and daily life, capturing, transmitting and storing digital data is very simple and convenient. However, this creates a big problem: how to protect this data and prevent it from being modified without authorization. This problem also exists in other areas, such as copyright protection, content authentication, information hiding and communication overlay. Many researchers have developed various digital watermarking algorithms to solve this problem, they intend to embed some secret data (called watermark) content in the digital to mark or seal the digital data content. The principle behind embedding a watermark into a host image is that the distortion caused by the embedding is too small to be noticed. At the same time, embedded watermarks must be robust enough against common degradations or deliberate attacks.
发明内容Contents of the invention
有鉴于此,本发明实施例提供一种图像数据保护和篡改检测技术方案。该方案定义了基于LBP算法的布尔函数运算,并调整邻域内的一个或多个像素,使函数的结果与嵌入水印的w一致,实现水印嵌入到空间域,以保护宿主图像不被篡改。In view of this, an embodiment of the present invention provides a technical solution for image data protection and tampering detection. The scheme defines the Boolean function operation based on the LBP algorithm, and adjusts one or more pixels in the neighborhood to make the result of the function consistent with the w embedded in the watermark, so that the watermark can be embedded in the spatial domain to protect the host image from being tampered with.
为达到上述效果,本发明提出一种图像数据保护和篡改检测技术方案,包括:单级水印技术方案、双层水印技术方案、多层水印技术方案。具体实施过程如下:In order to achieve the above effects, the present invention proposes an image data protection and tamper detection technical solution, including: a single-stage watermark technical solution, a double-layer watermark technical solution, and a multi-layer watermark technical solution. The specific implementation process is as follows:
单层水印技术方案:Single-layer watermarking technical solution:
水印嵌入算法:Watermark embedding algorithm:
步骤一:原始图像被分割为(P,R)不重叠的局部区域块。LBP算法用于计算和/>,以及/>。w代表水印的其中一位,β为水印的强度因子。Step 1: The original image is segmented into (P, R) non-overlapping local area blocks. The LBP algorithm is used to calculate and /> , and /> . w represents one bit of the watermark, and β is the strength factor of the watermark.
步骤二:对于每一个(P,R)局部区域,如果的值等于w的值,我们对区域像素不做任何处理。否则,为了使/>的值与w的值保持一致,需要修改邻域的像素值。Step 2: For each (P, R) local area, if The value of is equal to the value of w, we do not do anything to the area pixels. Otherwise, in order to make /> The value of is consistent with the value of w, and the pixel value of the neighborhood needs to be modified.
水印提取算法:Watermark extraction algorithm:
步骤一:在水印图像中判断的值;Step 1: Judging in the watermark image value;
步骤二:提取水印w。即如果的值为1,那么w也为1,否则为0。Step 2: Extract the watermark w. That is, if is 1, then w is also 1, otherwise it is 0.
在本发明的一种实施例中,水印嵌入算法所述步骤一中布尔函数为:In one embodiment of the present invention, the Boolean function in
其中⊕是异或(XOR)运算符,。#1(/>)表示在/>中值为1的像素数,#0(/>)表示在/>中值为0的像素数,N是整数,N/>。如果/>,那么返回1;否则,它将返回0。where ⊕ is the exclusive-or (XOR) operator, . #1 (/> ) expressed in /> The number of pixels with a median value of 1, #0 (/> ) expressed in /> The number of pixels with a median value of 0, N is an integer, N/> . if /> ,So Returns 1; otherwise, it returns 0.
本发明的一种实施例中,水印嵌入算法所述步骤二中使的函数值和w一致的方法:假设/>,/>;或/>,/>,则有/>。假设/>,则有/>,否则/>。如果有多个最小值,我们选择最小值的任何一个来改变像素值。如果一个块的像素都是0或1,我们将根据相应的水印位来修改中心像素,然后将其嵌入到块中。In one embodiment of the present invention, in the
双层水印技术方案:将区域划分为两个部分:偶数和奇数邻域,即/>和/>。对它们执行/>,并实现在(P,R)邻域中嵌入两个位。这样,水印的容量就增加了一倍。Two-layer watermarking technical scheme: the region Divide into two parts: even and odd neighborhoods, i.e. /> and /> . execute /> on them , and realize embedding two bits in the (P, R) neighborhood. In this way, the capacity of the watermark is doubled.
多层水印技术方案:将5×5的邻域分成4个部分:、/>、/>、/>、i=0-3、j=0-7,对于和/>,使用/>来嵌入水印;对于/>和/>,使用/>在其中一区域上嵌入水印,而在另外一区域使用/>嵌入水印。因此,可以在不相互干扰的情况下单独嵌入四个水印。Multi-layer watermarking technical scheme: divide the 5×5 neighborhood into 4 parts: , /> , /> , /> , i=0-3, j=0-7, for and /> , using /> to embed the watermark; for /> and /> , using /> Embed a watermark in one area and use /> in the other Embed watermark. Therefore, four watermarks can be embedded individually without interfering with each other.
与现有的数字水印算法相比本方案有以下优点:Compared with existing digital watermarking algorithms, this scheme has the following advantages:
1、对图像格式没有要求;1. There is no requirement for the image format;
2、易于扩展;2. Easy to expand;
3、算法简单,易于实现;3. The algorithm is simple and easy to implement;
4、嵌入引起的失真太小,不容易被观察到;4. The distortion caused by embedding is too small to be easily observed;
5、嵌入的水印足够健壮,足以抵抗常见的退化和攻击。5. The embedded watermark is robust enough to resist common degradations and attacks.
附图说明Description of drawings
图1为本发明实施例的(P,R)局部区域定义;Fig. 1 is the definition of (P, R) local area of the embodiment of the present invention;
图2为本发明实施例的单层水印案例;Fig. 2 is the single-layer watermark case of the embodiment of the present invention;
图3为本发明实施例的双层水印方案;Fig. 3 is the two-layer watermark scheme of the embodiment of the present invention;
图4为本发明实施例的双层水印案例;Fig. 4 is the double-layer watermark case of the embodiment of the present invention;
图5为本发明实施例的多层水印方案;Fig. 5 is the multilayer watermark scheme of the embodiment of the present invention;
图6为本发明实施例的多层水印案例。Fig. 6 is an example of a multi-layer watermark according to an embodiment of the present invention.
具体实施方式Detailed ways
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚地描述,显然,所描述的实施例是本发明的一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are the Some, but not all, embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
如图1所示,本发明实施例的(P,R)局部区域定义,包括:As shown in Figure 1, the (P, R) local area definition of the embodiment of the present invention includes:
S1、表示中心像素c的灰色度;S1, Indicates the gray level of the central pixel c;
S2、表示相邻像素p的灰度值,/>是由相邻像素p和中心像素/>之间的差异值所生成的向量,而/>是来自这个差异的符号矢量。S2, Indicates the gray value of the adjacent pixel p, /> is composed of the adjacent pixel p and the central pixel /> The difference values between the generated vectors, while /> is the sign vector from this difference.
如图2所示,本发明实施例的单层水印案例,包括:As shown in Figure 2, the single-layer watermarking case of the embodiment of the present invention includes:
水印嵌入算法:Watermark embedding algorithm:
S1、原始图像被分割为(P,R)不重叠的局部区域块。LBP算法用于计算和/>,以及/>。设w代表水印的其中一位,β为水印的强度因子;S1. The original image is divided into (P, R) non-overlapping local area blocks. The LBP algorithm is used to calculate and /> , and /> . Let w represent one bit of the watermark, and β is the strength factor of the watermark;
S2、对于每一个(P,R)局部区域,如果的值等于w的值,我们对区域像素不做任何处理。否则,为了使/>的值与相应的w保持一致,我们会修改邻域像素。S2. For each (P, R) local area, if The value of is equal to the value of w, we do not do anything to the area pixels. Otherwise, in order to make /> The value of is consistent with the corresponding w, we will modify the neighboring pixels.
水印提取算法:在水印图像中我们判断的值,以提取水印w。Watermark extraction algorithm: in the watermark image we judge value to extract the watermark w.
如图3所示,本发明实施例的双层水印方案,包括:As shown in Figure 3, the two-layer watermarking scheme of the embodiment of the present invention includes:
S1、将邻域划分为两个部分:偶数和奇数邻域,即/>和/>;S1, the neighborhood Divide into two parts: even and odd neighborhoods, i.e. /> and /> ;
S2、对它们执行,并实现在(P,R)邻域嵌入两个位元。这样,水印的容量就增加了一倍,这实际上相当于两个(4,1)邻域。S2, execute on them , and realize embedding two bits in the (P, R) neighborhood. In this way, the capacity of the watermark is doubled, which is effectively equivalent to two (4,1) neighborhoods.
如图4所示,本发明实施例的双层水印案例,包括:As shown in Figure 4, the double-layer watermarking case of the embodiment of the present invention includes:
S1、将水印W1、W2嵌入到原始图像Lena中,并进行提取操作;S1. Embedding watermarks W1 and W2 into the original image Lena, and performing an extraction operation;
S2、对空间水印算法性能进行验证。S2. Verify the performance of the spatial watermarking algorithm.
如图5所示,本发明实施例的多层水印方案,包括:As shown in Figure 5, the multi-layer watermarking scheme of the embodiment of the present invention includes:
S1、将5×5的邻域分成4个部分:、/>、/>、/>、i=0-3、j=0-7,对于/>和/>,使用来嵌入水印;对于/>和/>,使用/>在其中一区域上嵌入水印,而在另外一区域使用/>嵌入水印。因此,可以在不相互干扰的情况下单独嵌入四个水印。S1. Divide the 5×5 neighborhood into 4 parts: , /> , /> , /> , i=0-3, j=0-7, for /> and /> ,use to embed the watermark; for /> and /> , using /> Embed a watermark in one area and use /> in the other Embed watermark. Therefore, four watermarks can be embedded individually without interfering with each other.
S2、,i=0-3是4个水印。首先嵌入了/>和/>,其中一个嵌入通过修改中心像素的值(水印系数=0.02),另一个通过改变一个非中心像素(水印系数=0.08)来嵌入。然后,再按照图3描述的方案嵌入/>和/>。S2, , i=0-3 are 4 watermarks. First embedded /> and /> , one of which is embedded by modifying the value of the central pixel (watermark factor = 0.02), and the other is embedded by changing a non-central pixel (watermark factor = 0.08). Then, follow the scheme described in Figure 3 to embed /> and /> .
如图6所示,本发明实施例的多层水印案例,包括:As shown in Figure 6, the multi-layer watermarking case of the embodiment of the present invention includes:
S1、将水印e、f、g、h嵌入到原始图像a、b、c、d中;S1. Embedding watermarks e, f, g, and h into original images a, b, c, and d;
S2、准确地对水印进行提取,因为这四个水印的嵌入过程不会相互影响。S2. Accurately extract the watermark, because the embedding process of these four watermarks will not affect each other.
虽然结合附图描述了本发明的实施方式,但是本领域技术人员可以在不脱离本发明的精神和范围的情况下做出各种修改和变型,这样的修改和变型均落入由所附权利要求所限定的范围之内。Although the embodiments of the present invention have been described in conjunction with the accompanying drawings, those skilled in the art can make various modifications and variations without departing from the spirit and scope of the present invention. within the bounds of the requirements.
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810216047.XA CN110276707B (en) | 2018-03-16 | 2018-03-16 | A technical solution for image data protection and tamper detection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810216047.XA CN110276707B (en) | 2018-03-16 | 2018-03-16 | A technical solution for image data protection and tamper detection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110276707A CN110276707A (en) | 2019-09-24 |
CN110276707B true CN110276707B (en) | 2023-06-23 |
Family
ID=67958851
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810216047.XA Expired - Fee Related CN110276707B (en) | 2018-03-16 | 2018-03-16 | A technical solution for image data protection and tamper detection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110276707B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111882525A (en) * | 2020-07-01 | 2020-11-03 | 上海品览数据科技有限公司 | Image reproduction detection method based on LBP watermark characteristics and fine-grained identification |
CN113191953B (en) * | 2021-06-04 | 2022-02-18 | 山东财经大学 | A Transformer-based face image super-resolution method |
CN115018689B (en) * | 2022-07-07 | 2025-04-22 | 南京师范大学 | Three-dimensional model copyright marking method and device based on Boolean operation |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6205249B1 (en) * | 1998-04-02 | 2001-03-20 | Scott A. Moskowitz | Multiple transform utilization and applications for secure digital watermarking |
JP2002354219A (en) * | 2001-05-23 | 2002-12-06 | Sony Corp | Method and device for embedding electronic watermark and program |
JP2007189676A (en) * | 2005-12-14 | 2007-07-26 | Toyohashi Univ Of Technology | Information embedding method and information reading method in texture image, information embedding device and information reading device in texture image |
CN102306305A (en) * | 2011-07-06 | 2012-01-04 | 北京航空航天大学 | Method for authenticating safety identity based on organic characteristic watermark |
CN105447492A (en) * | 2015-11-13 | 2016-03-30 | 重庆邮电大学 | Image description method based on 2D local binary pattern |
CN105844643A (en) * | 2016-03-30 | 2016-08-10 | 北京信息科技大学 | Image tamper detection method |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002232685A (en) * | 2001-01-31 | 2002-08-16 | Canon Inc | Digital watermark processing device, information processing device, digital content distribution system, digital watermark insertion method, and storage medium |
US10354355B2 (en) * | 2014-07-29 | 2019-07-16 | Tata Consultancy Services Limited | Digital watermarking |
US9639912B2 (en) * | 2014-12-30 | 2017-05-02 | University Of Macau | Method for reversible image data hiding |
US10223788B2 (en) * | 2016-08-31 | 2019-03-05 | International Business Machines Corporation | Skin lesion segmentation using deep convolution networks guided by local unsupervised learning |
-
2018
- 2018-03-16 CN CN201810216047.XA patent/CN110276707B/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6205249B1 (en) * | 1998-04-02 | 2001-03-20 | Scott A. Moskowitz | Multiple transform utilization and applications for secure digital watermarking |
JP2002354219A (en) * | 2001-05-23 | 2002-12-06 | Sony Corp | Method and device for embedding electronic watermark and program |
JP2007189676A (en) * | 2005-12-14 | 2007-07-26 | Toyohashi Univ Of Technology | Information embedding method and information reading method in texture image, information embedding device and information reading device in texture image |
CN102306305A (en) * | 2011-07-06 | 2012-01-04 | 北京航空航天大学 | Method for authenticating safety identity based on organic characteristic watermark |
CN105447492A (en) * | 2015-11-13 | 2016-03-30 | 重庆邮电大学 | Image description method based on 2D local binary pattern |
CN105844643A (en) * | 2016-03-30 | 2016-08-10 | 北京信息科技大学 | Image tamper detection method |
Non-Patent Citations (2)
Title |
---|
Semi-fragile spatial watermarking based on local binary pattern operators;Zhang Wenyin等;《OPTICS COMMUNICATIONS》;20110801;第284卷(第16-17期);第3904-3912页 * |
一种不可见性和鲁棒性均衡的数字图像水印技术;曹海;《微电子学与计算机》;20151105(第11期);第162-165页 * |
Also Published As
Publication number | Publication date |
---|---|
CN110276707A (en) | 2019-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mohanty et al. | Everything you want to know about watermarking: From paper marks to hardware protection | |
Lee et al. | Dual watermark for image tamper detection and recovery | |
CN104091302B (en) | A kind of robust watermarking insertion and extracting method based on multiscale space | |
Shen et al. | A novel image watermarking scheme based on support vector regression | |
CN110084733A (en) | The embedding grammar and system of text image watermark, extracting method and system | |
Gul et al. | A novel pixel-wise authentication-based self-embedding fragile watermarking method | |
Huo et al. | Alterable-capacity fragile watermarking scheme with restoration capability | |
CN110276707B (en) | A technical solution for image data protection and tamper detection | |
CN104537601A (en) | Gray level image aerial region steganography method based on nine grids | |
Ulutas et al. | A new copy move forgery detection method resistant to object removal with uniform background forgery | |
Zeki et al. | An intermediate significant bit (ISB) watermarking technique using neural networks | |
Chhajed et al. | Applying Decision Tree for Hiding Data in Binary Images for Secure and Secret Information Flow | |
Zhang et al. | Reversible data hiding in binary images based on image magnification | |
Surekha et al. | A multiple watermarking technique for images based on visual cryptography | |
CN1996381A (en) | Digital watermarking method and device for digital image | |
CN111461956A (en) | Image watermarking processing method | |
Xiao et al. | A semi-fragile watermarking tolerant of Laplacian sharpening | |
Jambhale et al. | A deep learning approach to invisible watermarking for copyright protection | |
Chhajed et al. | Data hiding in binary images for secret and secure communication using decision tree | |
Moon et al. | Hardware-based application of data security system using general modified secured diamond encoding embedding approach for enhancing imperceptibility and authentication | |
Chotikakamthorn et al. | Digital watermarking technique for image authentication by neighbouring block similarity measure | |
Yuan et al. | Reversible multi-level watermarking scheme for color images | |
Ernawan et al. | Fragile and Robust Dual Image Watermarking based on DWT-SVD | |
He et al. | A neighborhood-characteristic-based detection model for statistical fragile watermarking with localization | |
CN110648271A (en) | A Method of Embedding Digital Watermarks in Halftone Images Using Special Dots |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20230623 |
|
CF01 | Termination of patent right due to non-payment of annual fee |