An Image Tampering Detection Method Based on Double-Image Reversible Fragile Watermarking

A fragile watermark and tamper detection technology, applied in the field of image information, can solve problems such as unsatisfactory authentication results, inability to restore the original image without errors, and inaccurate detection of modified areas

Active Publication Date: 2020-08-14
ANHUI UNIVERSITY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, most current image tampering authentication methods use irreversible information hiding algorithms, and some fragile watermark authentication algorithms based on reversible information hiding, for example: in 2014, Lo et al. Embed the host image, the authentication result is not satisfactory
[0004] However, these existing methods more or less have the following defects: Most of the tampering authentication methods based on fragile watermarks are irreversible, and the original image cannot be restored without error after tampering detection; or it can be restored but it will lead to inaccurate detection of the modified area.
Ultimately, it will affect image security performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Image Tampering Detection Method Based on Double-Image Reversible Fragile Watermarking
  • An Image Tampering Detection Method Based on Double-Image Reversible Fragile Watermarking
  • An Image Tampering Detection Method Based on Double-Image Reversible Fragile Watermarking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0114] Embodiment 1: Carry out image hiding capacity, quality and safety test.

[0115] This embodiment uses MATLAB software, the watermark information is the binary pseudo-random number generated by the key, and nine 512×512 grayscale images: Lena, Peppers, Sailboat, Tiffany, Plane, Boat, Baboon, Splash, and Man are used as host images ,Such as figure 1 shown.

[0116] The quality of information hiding is usually evaluated from two aspects: the quality of information hiding and the capacity of information hiding. PSNR (peak signal to noise ratio) is a common indicator for evaluating the quality of information hiding. The calculation formula is as follows:

[0117]

[0118]

[0119] MSE is I 1 ' and I1 mean square error of . I 1 ' and I 1 The higher the similarity, the smaller the mean square error and the higher the PSNR value. Generally, when the PSNR value is greater than 30dB, it is difficult for people to directly observe the difference between the two images...

Embodiment 2

[0125] Example 2: Image Integrity Authentication Test.

[0126] Figure 4 In embodiment 2, after using the present invention, the distribution of the authentication information area in the image can be embedded. Here, the present invention groups two pixels into one group. Figure 4 The middle black and white are alternately distributed, the black part is a blind area, and the white part can be embedded in the authentication information area. Figure 4 The first pair of pixels in (a) embed authentication information, Figure 4 The first pair of pixels in (b) embeds distortion information, and the second pair of pixels in the two images is the opposite, that is, the area embedded with authentication information and the area embedded with distortion information are equally divided by the two images. Compared with other reversible authentication methods, the embeddable area of ​​the authentication method in the present invention is not limited by image texture.

[0127] In or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an image tampering detection method based on reversible fragile watermarks of two images. Every two pixels of a host image are divided into a group, a reversible information hiding algorithm is used to embedd authentication information into each group of pixels, finally two watermark images are generated, and in the time of authentication, whether each group of pixels is tampered is determined through comparing information extracted from the two watermark images and original authentication information. According to the method, an image redundancy space can be more fully and flexibly utilized, while a lot of authentication information is embedded, the image distortion is reduced, and the accuracy of tampering authentication is improved.

Description

technical field [0001] The invention relates to an image information technology, in particular to an image tampering detection method based on a double-image reversible fragile watermark. Background technique [0002] With the continuous development of digital multimedia and computer networks, the replication, storage and dissemination of data such as text, audio, image and video with digital media as the carrier has been widely used, bringing people's daily life, work and study. Great convenience. Today, with the rapid development of image processing software, digital images can be easily modified and difficult to detect. Direct use of unauthenticated images has huge risks. Pure information encryption does not have any integrity protection, and any information changes are blocked. It is considered legal, which leads to the attacker intercepting the encrypted information, tampering with it, destroying it, and then sending it, making the encrypted information unable to be tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00G06T5/00
CPCG06T1/0042G06T5/001
Inventor 殷赵霞牛雪静杜洋
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products