Method for generating and authenticating frailty watermark based on error correction encoding

A fragile watermark and authentication method technology, applied in the field of image processing, can solve the problems of no way to accurately locate the tamper position, insufficient anti-tamper performance, no repair, etc., to facilitate decoding error correction, increase security, and simplify parameter management Effect

Inactive Publication Date: 2008-11-12
ZHEJIANG UNIV
View PDF1 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the anti-tampering performance of this method is insufficient, and there is no way to accurately locate the tampered position, and there is no repair function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating and authenticating frailty watermark based on error correction encoding
  • Method for generating and authenticating frailty watermark based on error correction encoding
  • Method for generating and authenticating frailty watermark based on error correction encoding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] A fragile watermark generation and authentication method based on error correction coding includes a fragile watermark generation method and a fragile watermark authentication method, the specific content and steps are as follows:

[0036] 1. Watermark generation and embedding:

[0037] Such as figure 1 As shown, the watermark generation and embedding process is:

[0038] 1. Do a 2:1 downsampling after the lowest position of the original image is zeroed to generate a reduced image J whose length and width are respectively 50% of the original. Perform two-dimensional one-level discrete wavelet transform (DWT) on the reduced image J, decompose to obtain wavelet coefficients {LL, LH, HL, HH}, and perform 4-bit quantization on its low-frequency coefficient LL to form a binary bit stream D J LL . For the first-level wavelet transform, the maximum value of the original image is 255, and the maximum wavelet coefficient is 512, so quantization with a step size of 32 can ens...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a generating method and an authentication method for a fragile watermarking by utilizing the theory of error-correcting codes. The generating method for the watermarking in the invention is that: carrying out wavelet transformation on a shrunken initial image and carrying out quantification on the low frequency coefficients of the wavelet transformation obtained by decomposing, then carrying out BCH coding on the formed binary data and the binary data comprising fingerprint binary data, then carrying out scrambling encryption on the binary data and the binary data comprising fingerprint binary data to from the final watermarking and embedding the final watermarking into the lowest bit of the original image. The authentication method for the watermarking includes: obtaining the lowest bit of the image to be authenticated, recovering the scrambling of the lowest bit and carrying out corresponding BCH decoding to obtain the information of the initial image, the fingerprint information and the information of the error position which are used for the complete authentication and copyright protection. When carrying out image authentication, the invention does not need the initial image as well as the initial watermarking information; the parameter management of the invention is simple. The invention can not only distinguish the tampering objects, preciously locate the tampering position and point out the tampering intensity, but also provide basis for the ownership problem of the copyright according to the embedded fingerprint information.

Description

technical field [0001] The invention belongs to the technical field of image processing, and relates to a method for embedding and authenticating a falsified watermark of a tampering location and restoration type, which is used for digital image authentication and can provide integrity and authenticity proof for digital images. Background technique [0002] With the rapid development of multimedia network communication technology, the problem of digital information security maintenance has become increasingly prominent, and digital watermarking technology has emerged as the times require. At present, the use of fragile or semi-fragile digital watermarking technology to authenticate digital graphics has broad application prospects, and is increasingly concerned by academic and business circles. [0003] The basic purpose of digital image authentication is to detect whether the image to be tested has been tampered with. If it has been tampered with, it can not only give the re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06T1/00
Inventor 吴柏珊谢磊陈惠芳赵问道
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products