Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image-tampering detection and recovery method based on energy-domain semi-fragile watermarking

A technology for fragile watermarking and tampering detection, applied in image data processing, image data processing, instruments, etc., can solve the problems of unable to restore images and blind detection

Inactive Publication Date: 2010-12-01
GUILIN UNIV OF ELECTRONIC TECH
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this method cannot be used for blind detection, and cannot restore the original image from the tampered image

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image-tampering detection and recovery method based on energy-domain semi-fragile watermarking
  • Image-tampering detection and recovery method based on energy-domain semi-fragile watermarking
  • Image-tampering detection and recovery method based on energy-domain semi-fragile watermarking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] This embodiment adopts the static image grayscale picture LENA as the watermark carrier picture, in this example,

[0070] Step 1: see figure 2 , the watermark carrier picture LENA is divided into blocks with a size of 8×8, and the absolute difference in brightness between adjacent image blocks is calculated as the watermark content. Represented by two binary bits. Use the convolutional code (12, 1, 2) to perform convolutional coding on all the obtained watermark contents. The convolution code is formed into a matrix, and the scrambling result is formed by repeated diagonal scanning to obtain the embedded bit value. The watermark carrier image is divided into blocks with a size of 4×4, and Walsh-Hadamard transform is performed on each block ( figure 2 Walsh transform for short), the transformation formula is F=H M ×f×H N , where the transformation matrix is

[0071] H ′ 8 = 1 ...

Embodiment 2

[0099] Apply the above method to a 512×512 grayscale (color) image named airplane as a watermark carrier image, and add another airplane above the original image airplane (such as Figure 5 .a). In order to precisely locate the location of image tampering, the size of the block is 4×4. Apply the image to the above tamper detection pipeline. The results of tamper detection are as follows Figure 5 As shown in .b, the area where the image has been tampered with can be clearly seen; the results of accurate detection are as follows Figure 5 As shown in .c, the restoration result of the original image is as follows Figure 5 .d.

Embodiment 3

[0101] This method is applied to LENA pictures for lossy compression attack test. The experimental effect picture is as follows Image 6As shown, from the point of view of actual effect, take Δq=17 and then list them in various situations, including: JPEG85%, 65%, 40%, 25% quality, JPEG2000 compression ratios are 10:1, 15:1 respectively , 20:1 tampering detection results, and restore the original image of the tampered area, the results are as follows Image 6 shown.

[0102] The above experiments use typical test pictures to test the invention from the aspects of watermark construction and embedding, static image tampering detection and restoration, etc., thus proving the effectiveness of the method.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an image-tampering detection and recovery method based on an energy-domain semi-fragile watermarking. The method comprises the following steps: on the basis of image partitioning, a brightness difference value is extracted as an initial watermarking, on the basis of carrying convolutional encoding and scrambling on the initial watermarking, watermarking information is embedded into an image block after Walsh-Hadamard transform, and at last, Walsh-Hadamard reverse transform is carried out on the image to finish the embedment of the image watermarking to obtain a picture containing the watermarking; the image watermarking is extracted at a watermarking extraction and detection end through partitioning the image embedded with the watermarking and carrying out the Walsh-Hadamard transform, bit reverse scrambling, the convolutional encoding and other operations, and the preliminary detection and accurate detection of tampering are preformed through comparing the image brightness and other information with the watermarking information to locate a tampered region; and the tampered region is recovered by Viterbi decoders. The invention can resist attack of JPEG, JPEG2000 and other lossy compression and high-proportion lossy compression, and the blind detection of the watermarking and the recovery of the tampered image are achieved without additional information in the detection process.

Description

technical field [0001] The invention relates to an image tampering detection and restoration method in the field of digital watermarking, in particular to an image tampering detection and restoration method based on an energy domain semi-fragile watermark. Background technique [0002] The wide application of digital images has brought about the problem of identifying the authenticity of its content. Especially with the emergence of various high-quality and high-precision image processing equipment and a large number of digital image processing software, it is more convenient to edit and modify digital images. At present, the identification of image tampering mainly adopts semi-fragile digital watermarking technology, which is robust to legal distortion and sensitive to illegal distortion, and has certain positioning ability and original image restoration ability. [0003] After literature search, Yu and Lu proposed a digital image authentication method in the article "Mean...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
Inventor 赵峰李剑李生红张爱新李琳
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products