Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks

A digital image and authentication method technology, applied in image data processing, image data processing, instruments, etc., can solve the problems of low positioning accuracy, adding texture features, redundancy, etc.

Inactive Publication Date: 2012-11-07
SOUTHWEST JIAOTONG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are two most commonly used methods for generating and restoring watermarks: ① Quantization and encoding of important DCT (discrete cosine transform) coefficients of 8×8 image blocks, the disadvantage of which is low positioning accuracy
② The average value of 2×2 image blocks has high positioning accuracy, but it is vulnerable to constant average value attacks and the recovery quality of non-smooth image blocks is not good
But saving the texture features of the image block will increase the watermark capacity, and adding texture features to smooth blocks like B1 is redundant

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks
  • Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks
  • Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0056] A variable-capacity watermark generation and authentication method with recoverable digital image tampered content, including four parts: watermark generation and embedding, watermark extraction and comparison, tamper detection and tamper recovery.

[0057] A. Watermark generation and embedding

[0058] figure 1 It is a block diagram of the specific steps of watermark generation and embedding in the method of the embodiment of the present invention, including the following five steps:

[0059] A1. Image block and classification: divide the original image X with a size of 2m×2n into m×n 2×2 image blocks that do not overlap each other i ={x i1 , X i2 , X i3 , X i4 }, where i is the image block number, i=1, 2,..., N, N=m×n is the number of image blocks; and the image blocks are divided into smooth image blocks and non-smooth images according to the content of the image blocks Two types of blocks;

[0060] Image block classification in this embodiment: for 2×2 image block X i ={x ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for generating and authenticating digital image tampered content recoverable variable capacity watermarks, which comprises the following steps of: dividing 2*2 image blocks into smooth image blocks and non-smooth image blocks, extracting 6bit characteristics from the smooth image blocks, extracting 12bit characteristics from the non-smooth image blocks, encryptingthe characteristics of the image blocks to generate image block recovery watermarks, randomly embedding the image block recovery watermarks into other image blocks, and judging the authenticity of the image blocks by comparing the consistency of the characteristics of the image blocks and combining block neighborhood characteristics. For the judged tampered image blocks, different tampering recovery operations are executed in two steps according to whether the corresponding recovery watermarks of the image blocks are tampered to improve the tampering recovery quality. The variable capacity recovery watermarks are generated according to the personal characteristics of the image blocks, and the recovery watermarks are simultaneously used for tampering positioning and tampering recovery, so the watermark embedding capacity is reduced when enough image characteristics are ensured, and watermark-containing image quality and tampering recovery quality are considered; and meanwhile, the security is improved, and known forging attacks such as joint attack, mean attack and the like can be resisted.

Description

Technical field [0001] The invention relates to a method for generating and authenticating an authentication watermark capable of restoring the tampered content of a character image, which is used for detecting the authenticity and integrity of a digital image and recovering the tampered image. Background technique [0002] With the development of computer, digital imaging and network communication technology, digital images have become the main source of people's acquisition and exchange of information and one of the important carriers of information dissemination. The digital storage of images and the emergence of various image processing software have made the editing, modification and synthesis of digital images very simple. Digital image processing technology has improved the display quality of images, but tampering and forging images, such as being used in news media, forensic evidence, scientific discoveries, and other fields, will bring serious consequences to the integri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
Inventor 和红杰陈帆
Owner SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products