Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Pixel-level image authentication, tampering detection and restoration method

An image authentication and tampering detection technology, applied in image enhancement, image data processing, image data processing, etc., can solve the problem that the block-level scheme cannot locate tampered pixels, the recovery quality of non-smooth image blocks is poor, and the tampering localization ability It can improve the practicality of the technology, save the storage space, and improve the detection rate.

Active Publication Date: 2018-11-23
NANKAI UNIV
View PDF10 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Fridrich applied this technology to the block-level scheme. Experiments show that the block-level will no longer suffer from the above-mentioned attacks, but it performs poorly in tampering localization ability, and the block-level scheme cannot locate the tampered pixels ([9][10 ][11])
[0006] In the existing image restoration technology, there are mainly two methods for generating the restored watermark: (1) 8×8 image blocks and quantization and encoding of important DCT (discrete cosine transform) coefficients, the disadvantage is that the positioning accuracy is low; (2) The 2×2 image is divided into blocks and averaged, which has high positioning accuracy, but is vulnerable to constant average attack and the recovery quality of non-smooth image blocks is not good

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pixel-level image authentication, tampering detection and restoration method
  • Pixel-level image authentication, tampering detection and restoration method
  • Pixel-level image authentication, tampering detection and restoration method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0089] The specific implementation manners of the present invention will be described below in conjunction with the accompanying drawings.

[0090] figure 1 A flow chart of processing operations on different types of pictures in the present invention is given. In the present invention, related operations can be performed on images such as gray scale images and color images, so the judgment operation can be performed on the pictures before implementing the scheme on the pictures.

[0091] Such as figure 1 As shown, the method M100 starts from step S110, step S120 reads a picture to be processed, and step S130 determines the type of the picture. If the picture belongs to the color picture, then execute step S140, divide the picture into three planes of R, G, and B, and perform the embedding watermark mentioned later on the picture in steps S150, S160, S170, S180, and S190 , authenticity verification, tampering location, tampering recovery and other operations, and finally in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a pixel-level image authentication, tampering detection and restoration method. According to the method, different types of pictures are processed by discriminating picture categories; restoration watermark information is generated through Hamming codes and the compression principle; hash values generated in advance serve as authentication watermark information; positioningwatermark information is generated by disturbing picture pixel points; authenticity verification is performed on extracted data information through comparison; positions of tampered pixel points aredetected by comparing flag bits; and fuzzy restoration is performed on tampered images through error correction codes. Through the method, security protection can be performed on any grayscale image or color image; and a change with arbitrary granularity in an image can be detected, and the tampered pixel points can be positioned. By use of the method, authenticity verification can be performed onimages in arbitrary forms, such as scanning images, handwritten signatures and electronic files, and then pixel-level detection and restoration can be performed on the tampered images.

Description

technical field [0001] The invention belongs to the technical fields of image authentication, tampering detection, image restoration and information security, and specifically relates to pixel-level image authentication, tampering detection and restoration methods. Background technique [0002] With the wide application of the Internet and the rapid development of high-performance computers, pictures have increasingly become the main form for people to store, transmit and express information. In the context of today's information age, it is increasingly common to use the Internet to handle traditional affairs, government offices, and business activities, and various multimedia forms such as video, audio, and images have been widely used. In the whole process, the digital image is represented by a two-dimensional digital group, and each pixel is a limited value, which is stored on the network in a digital form. While the digital image brings us convenience and speed, the digi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T1/00G06T5/00G06F21/60
CPCG06F21/602G06T1/0042G06T5/00
Inventor 李潞洋苏明
Owner NANKAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products