Safe fragile watermarking method based on multiple dependency structures
A fragile watermarking and secure technology, applied in the field of information hiding and security, which can solve the problems of not being able to give the cause of damage and locating the tampering position, increasing the burden of network transmission, and raising key management.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0089] In the embodiment, a Trunk image with a size of 512×512 is used, such as Figure 4a , the block size is 8×8, and a 64-bit watermark is generated for each block, which is divided into 8 parts and embedded into other 8 blocks selected by random positions. Figure 4b It is a watermarked image, and the peak signal-to-noise ratio (PSNR) of the original image is 54.17dB. Figure 4c is the detection result when there is no tampering (the black area indicates that no tampering is detected, and the white area indicates that tampering is detected), Figure 4c The display is all black, indicating that the image remains intact. Then by duplicating two Trunks at the bottom, tampering with the original image is realized, such as Figure 4d , then the tampering detection result obtained by using the present invention is as follows Figure 4e , it can be seen from the white area shown in the figure that the present invention can accurately locate the tampered area.
[0090] Another...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 