Visual secret sharing-based image content tampering detection method

A technology of secret sharing and image content, applied in image data processing, image data processing, instruments, etc., can solve the problems of no image integrity authentication function, weak robustness of image processing operations, and no obvious update of algorithms, etc., to achieve Realize the effects of copyright protection, high efficiency and strong practicability

Inactive Publication Date: 2011-08-03
XIAN UNIV OF TECH
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above methods can only achieve copyright protection, and do not have the image integrity authentication function
In addition, there are different degrees of shortcomings. The operation of Chuen-Ching Wang et al. is carried out in the air domain, and its disadvantage is that it is not robust to conventional image processing operations. The methods of Hsieh et al. are all in the transform domain The image is processed, but the algorithm is more complicated. It extends the method to the color image copyright protection, and simply extends the grayscale image into a color image. There is no obvious update in the algorithm; and the method in the color image copyright protection requires Convert RGB mode of color image to YCbCr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Visual secret sharing-based image content tampering detection method
  • Visual secret sharing-based image content tampering detection method
  • Visual secret sharing-based image content tampering detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0030] Such as figure 1 Shown, the present invention a kind of image content tampering detection method based on visual secret sharing, comprises the following steps:

[0031] Information sender:

[0032] Step 1. For a given original image I 0 , use the feature extraction algorithm Algorithm 1 to extract the original image feature F 0 ;

[0033] Among them, the feature extraction algorithm Algorithm 1 in step 1 is:

[0034] Take the input N×N original image I 0 Divide into 8×8 non-overlapping blocks to get N 2 / 64 image blocks, denoted as I ij , where i=1, 2,..., N / 8, j=1, 2,..., N / 8; perform 3-level db1 wavelet decomposition on each image block to obtain each 8×8 image block LL 3 Subband wavelet coefficient a ij (i=1, 2,..., N / 8, j=1, 2,..., N / 8), generate the original image feature F 0 :

[0035] F 0 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a visual secret sharing-based image content tampering detection method. The method comprises the following steps of: generating a watermarking image by using copyright information of the image; generating a verification shadow and a detection shadow by combining the content characteristic of the image; recovering a water mark from the verification shadow and the detection shadow by using a visual secret sharing technology; and comparing the recovered water mark with the original watermarking to determine whether the image is tampered so as to realize tampering detection and determine the position of a tampered region. In the method, the watermarking image is generated by using the copyright information of the image without embedding and extracting the watermarking, but the tampering detection of image content is realized by using the visual secret sharing technology on the premise of not damaging the original image data.

Description

technical field [0001] The invention belongs to the technical field of multimedia information security, and in particular relates to an image content tampering detection method based on visual secret sharing. Background technique [0002] With the rapid development of network technology and digital technology, the exchange of multimedia information has reached an unprecedented breadth. At the same time, the development of image processing technology and the application of powerful image editing software make it easy for ordinary users to edit and tamper with the original image data to create a fake effect. This greatly reduces the credibility of multimedia data itself, subverting the long-standing traditional concept of "seeing is believing" in people's minds. How to realize the content integrity authentication of digital images has become a hot research topic in the field of multimedia information security. [0003] Image digital watermarking is a commonly used image inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
Inventor 王晓峰王尚平张亚玲
Owner XIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products