Pixel-level image authentication, tampering detection and restoration method

An image authentication and tampering detection technology, applied in image enhancement, image data processing, image data processing, etc., can solve the problem that the block-level scheme cannot locate tampered pixels, the recovery quality of non-smooth image blocks is poor, and the tampering localization ability It can improve the practicality of the technology, save the storage space, and improve the detection rate.

Active Publication Date: 2018-11-23
NANKAI UNIV
View PDF10 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Fridrich applied this technology to the block-level scheme. Experiments show that the block-level will no longer suffer from the above-mentioned attacks, but it performs poorly in tampering localization ability, and the block-level scheme cannot locate the tampered pixels ([9][10 ][11])
[0006] In the existing image restoration technology, there are mainly two methods for generating the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pixel-level image authentication, tampering detection and restoration method
  • Pixel-level image authentication, tampering detection and restoration method
  • Pixel-level image authentication, tampering detection and restoration method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0089] The specific embodiments of the present invention will be described below in conjunction with the drawings.

[0090] figure 1 A flow chart of the processing operation of different types of pictures in the present invention is given. In the present invention, related operations can be performed on images such as grayscale images and color images, and therefore, the judgment operation can be performed on the picture before implementing the scheme.

[0091] Such as figure 1 As shown, the method M100 starts from step S110, step S120 reads the picture to be processed, and step S130 determines the type of the picture. If the picture is a color picture, perform step S140 to divide the picture into three planes R, G, and B, and perform the embedded watermark mentioned later on the picture in step S150, step S160, step S170, step S180, and step S190 , Authenticity verification, tampering location, tampering recovery and other operations. Finally, in step S1100, the processing result...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a pixel-level image authentication, tampering detection and restoration method. According to the method, different types of pictures are processed by discriminating picture categories; restoration watermark information is generated through Hamming codes and the compression principle; hash values generated in advance serve as authentication watermark information; positioningwatermark information is generated by disturbing picture pixel points; authenticity verification is performed on extracted data information through comparison; positions of tampered pixel points aredetected by comparing flag bits; and fuzzy restoration is performed on tampered images through error correction codes. Through the method, security protection can be performed on any grayscale image or color image; and a change with arbitrary granularity in an image can be detected, and the tampered pixel points can be positioned. By use of the method, authenticity verification can be performed onimages in arbitrary forms, such as scanning images, handwritten signatures and electronic files, and then pixel-level detection and restoration can be performed on the tampered images.

Description

technical field [0001] The invention belongs to the technical fields of image authentication, tampering detection, image restoration and information security, and specifically relates to pixel-level image authentication, tampering detection and restoration methods. Background technique [0002] With the wide application of the Internet and the rapid development of high-performance computers, pictures have increasingly become the main form for people to store, transmit and express information. In the context of today's information age, it is increasingly common to use the Internet to handle traditional affairs, government offices, and business activities, and various multimedia forms such as video, audio, and images have been widely used. In the whole process, the digital image is represented by a two-dimensional digital group, and each pixel is a limited value, which is stored on the network in a digital form. While the digital image brings us convenience and speed, the digi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00G06T5/00G06F21/60
CPCG06F21/602G06T1/0042G06T5/001
Inventor 李潞洋苏明
Owner NANKAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products