Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image tampering detection positioning and self-recovery method based on fragile watermark

A technology of tamper detection and fragile watermark, which is applied in image communication, encryption device with shift register/memory, digital transmission system, etc., can solve the problems of unable to realize original image self-recovery, image visual effect deterioration, etc., to achieve optimal Effect of watermarking on image quality, high tamper detection rate

Active Publication Date: 2021-06-22
ANHUI NORMAL UNIV
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most current image integrity authentication technologies based on fragile watermarks have the following disadvantages: the visual effect of the image will be deteriorated after embedding the watermark, or the self-recovery of the original image cannot be achieved after tampering detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image tampering detection positioning and self-recovery method based on fragile watermark
  • Image tampering detection positioning and self-recovery method based on fragile watermark
  • Image tampering detection positioning and self-recovery method based on fragile watermark

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The specific implementation of the present invention will be described in further detail below by describing the embodiments with reference to the accompanying drawings, so as to help those skilled in the art have a more complete, accurate and in-depth understanding of the inventive concepts and technical solutions of the present invention.

[0050] figure 1 It is a flow chart of the image tampering detection, positioning and self-recovery method of the fragile watermark provided by the embodiment of the present invention. The method specifically includes the following steps:

[0051] S1. Carry out one-dimensional arrangement of each row of pixels in the original image I having a size of h×w to form a one-dimensional pixel image, and divide the one-dimensional pixel image into non-overlapping image block sequences;

[0052] S2. Construct 7 random hash functions and a hash indicator table HIT according to the random number seed S;

[0053] Use the random number seed S t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an image tampering detection positioning and self-recovery method for fragile watermarks, and the method comprises the steps: carrying out the one-dimensional arrangement of each row of pixels in an original image I to form a one-dimensional pixel image, dividing the one-dimensional pixel image into a non-overlapping image block sequence, and enabling each image block to comprise two continuous pixel points; constructing a Hash indicator table HIT, a Hash address table HAT, a tag table FT and an inverse Hash address table IHAT of each image block; determining a puzzle matrix corresponding to the key K, and constructing a dual matrix DM based on the puzzle matrix; generating authentication data B based on the Hash indicator table HIT of the image block Bu and the feature information of the image block BIHAT(u), and embedding the authentication data B into the image block Bu to generate a digital watermark image I '; and according to the determined image authentication rule, carrying out tampering detection positioning and self-recovery on the digital watermark image I'. According to the method, a perfect Hash model is used for generating authentication data, so that the authentication data has the self-recovery performance of a tampered area while a high tampering detection rate is obtained.

Description

technical field [0001] The invention belongs to the technical field of image authentication, and more specifically, the invention relates to an image tampering detection, positioning and self-recovery method based on a fragile watermark. Background technique [0002] With the rapid development of multimedia signal processing technology and computer network, digital information transmission using image as the medium has become faster and more effective. Users can easily modify, transform, copy and disseminate digital images transmitted through the Internet. While improving communication efficiency, it also brings security risks, making it difficult for other users to detect certain tampering of transmitted images. In some scenarios, image integrity is particularly important. For example, the tampering of medical images may affect the doctor's judgment on the patient's condition, and the tampering of images used as judicial evidence may affect the judgment of the case. Theref...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/32H04L9/06
CPCH04N1/32331H04N1/32352H04L9/0643H04L2209/608
Inventor 李雪静罗永龙张肖孙中明陈前程陈荣升袁宝如
Owner ANHUI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products