Semi-fragile watermarking method for color image tamper localization and recovery

A digital watermarking and color image technology, applied in image data processing, image data processing, image coding, etc., can solve the problems that algorithms rarely resist lossy compression, limit the application scope of image authentication, and have no special processing for color images. To achieve the effect of increasing the amount of embedded information, enhancing concealment, and restoring good quality

Active Publication Date: 2012-03-28
河木(北京)科技发展有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] There have been some researches and methods of image authentication based on digital watermarking in the prior art, but there are certain deficiencies: the digital image storage of existing image devices (including digital cameras) generally adopts the JPEG lossy compression method, and the current algorithm It is rarely resistant to lossy compression, and it is even more difficult to resist blurring and sharpening, which are beneficial to image practical applications; at the same time, most of the existing results can only locate the tampered part of the image, but cannot restore it; in addition, Most of the current methods focus on grayscale images, and there is no special treatment for commonly used color images, which neither utilizes the redundancy of color images nor greatly limits the application range of image authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Semi-fragile watermarking method for color image tamper localization and recovery
  • Semi-fragile watermarking method for color image tamper localization and recovery
  • Semi-fragile watermarking method for color image tamper localization and recovery

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The watermark embedding and extraction process of the semi-fragile digital watermarking method for color image tampering location and restoration can be divided into the following steps: a) Convert the image to the YCbCr color space; b) Divide the Y component into blocks, and discrete each block Wavelet transform; c) Use the SPIHT algorithm to compress each image block to generate a compressed code stream; d) Use diagonal exchange and chaotic sequence to rearrange the compressed code stream; e) Calculate the recovery watermark and authentication watermark; f) Make the original image 8×8 DCT transformation, the recovery watermark is embedded into the DCT coefficient matrix of the Cb and Cr components, and the authentication watermark is embedded into the DCT coefficient matrix of the Y component; g) The DCT coefficient matrix after the watermark is embedded is subjected to an 8×8 DCT inverse transformation, And convert back to RGB color space; h) Use affine transformation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a semi-fragile digital watermarking method for color image tamper localization and recovery. The method comprises the following steps: a grayscale version of an original image is partitioned into blocks and decomposed by wavelet, a binary watermark containing an authentication watermark and a recovery watermark is generated from each image block by loss compression, and the binary watermark is embedded into other image blocks by automorphism mapping; tampered image blocks are localized by the watermark extracted from each image block when the image is authenticated; and a recovery watermark is extracted from other corresponding blocks to recover the original image by decompression as for tamped parts. The method can help process color images, causes the watermarksembedded in the images to be capable of resisting JPEG compression, fuzziness and sharpening, and can localize malicious tampering with the precision of 8*8 pixels, and provide grayscale image recovery of the tampered regions.

Description

technical field [0001] The invention relates to the technical field of image authentication, in particular to a semi-fragile digital watermark method for color image tampering, location and recovery. Background technique [0002] At present, in many practical applications, photos are the carrier that can best record the real situation. However, because the modification of digital images is too easy and verification is difficult, digital photos cannot play a role in serious applications such as forensics and archiving. Therefore, digital image authentication is required to ensure the authenticity of digital images. There are two types of digital image authentication: digital signature and digital watermark. Among them, digital watermark technology is more suitable for image authentication because it does not require additional space to store authentication information. [0003] There have been some researches and methods of image authentication based on digital watermarking ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00G06T9/00
Inventor 董申左喆李丹丹
Owner 河木(北京)科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products