Unlock instant, AI-driven research and patent intelligence for your innovation.

Safe fragile watermarking method based on multiple dependency structures

A fragile watermarking and secure technology, applied in the field of information hiding and security, which can solve the problems of not being able to give the cause of damage and locating the tampering position, increasing the burden of network transmission, and raising key management.

Inactive Publication Date: 2013-04-24
BEIHANG UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this scheme has the following disadvantages: 1) the scheme appends the summary to the message and sends it together with the message, which increases the data volume of the file and correspondingly increases the burden of network transmission; high demands
4) Only the integrity of the data can be judged, and the cause of damage and the location of tampering can not be given
However, this type of method cannot detect tampering of isolated blocks. In fact, in some cases, this operation may change the content of the image, such as the minutiae information of the fingerprint image.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe fragile watermarking method based on multiple dependency structures
  • Safe fragile watermarking method based on multiple dependency structures
  • Safe fragile watermarking method based on multiple dependency structures

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0089] In the embodiment, a Trunk image with a size of 512×512 is used, such as Figure 4a , the block size is 8×8, and a 64-bit watermark is generated for each block, which is divided into 8 parts and embedded into other 8 blocks selected by random positions. Figure 4b It is a watermarked image, and the peak signal-to-noise ratio (PSNR) of the original image is 54.17dB. Figure 4c is the detection result when there is no tampering (the black area indicates that no tampering is detected, and the white area indicates that tampering is detected), Figure 4c The display is all black, indicating that the image remains intact. Then by duplicating two Trunks at the bottom, tampering with the original image is realized, such as Figure 4d , then the tampering detection result obtained by using the present invention is as follows Figure 4e , it can be seen from the white area shown in the figure that the present invention can accurately locate the tampered area.

[0090] Another...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe fragile watermarking method based on multiple dependency structures. The method comprises a watermark embedding part and a tampering localization part, wherein the watermark embedding process specifically comprises the following steps of: a step 1 of segmenting an image file, a step 2 of generating a watermark, a step 3 of embedding the watermark and a step 4 of obtaining an image Y containing the water mark through the three steps; and an image authentication process specifically comprises the following steps of: a step 1 of generating the watermark, a step 2 of extracting the watermark and a step 3 of authenticating integrity. The method can accurately check the integrity of images, and can implement accurate location of tampering. Particularly, for isolated block tampering which cannot be detected by a conventional algorithm, the method has better detection and location effect, and the method encrypts the generated watermark, and selects an embedding position of the watermark through a chaotic sequence generated by a key, so that safety intensity of the method is improved.

Description

technical field [0001] The invention relates to an integrity authentication method of a digital image, in particular to the integrity authentication and tampering positioning of a digital image by using a fragile watermark method, and belongs to the field of information hiding and security. Background technique [0002] With the rapid development of computer information technology, people can store and transmit digital media economically, conveniently and efficiently. However, through special computer software, the content of digital media can be easily changed without being discovered by people. Once used by criminals, it will bring unnecessary losses. Therefore, the issues of information security and content security of digital media have become increasingly prominent. People need to study related technologies to effectively protect the authenticity and integrity of information content, so as to avoid illegal operations such as forgery and tampering of digital media by a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
Inventor 王蕴红李春雷张兆翔马彬柳立宁张广鹏胡懋地
Owner BEIHANG UNIV