Unlock instant, AI-driven research and patent intelligence for your innovation.

A Fragile Watermark-Based JPEG Image Tampering Detection Method

A fragile watermarking and tampering detection technology, which is applied in the fields of information hiding, digital forensics, digital watermarking, and tampering detection, and can solve the problems of image fragile watermark damage and JPEG image tampering location cannot be clearly determined.

Active Publication Date: 2022-07-01
湖北微模式科技发展有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to solve the problems in the prior art that the tampering position of the JPEG image cannot be clearly determined, and the fragile watermark of the picture is easily damaged, etc., and proposes a JPEG image anti-tampering method based on the fragile watermark, which is verified in units of blocks , compared with the traditional hash or digital signature, it can effectively locate the tampering position

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Fragile Watermark-Based JPEG Image Tampering Detection Method
  • A Fragile Watermark-Based JPEG Image Tampering Detection Method
  • A Fragile Watermark-Based JPEG Image Tampering Detection Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0049] see figure 1 It is a full flow chart of a JPEG image tamper-proof method based on a fragile watermark. A JPEG image tamper-proof method based on a fragile watermark of the present invention mainly includes the following steps:

[0050] Decode the JPEG image to obtain the number of luminance DCT blocks and the DCT quantization coefficients in each luminance block;

[0051] Use the key K to generate a pseudo-random number matr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a JPEG image tampering detection method based on a fragile watermark. First, the JPEG image is decoded to obtain the number of brightness DCT blocks and the DCT quantization coefficients in each brightness block; a key K is used to generate a pseudo-random number matrix to make Each DCT block can be assigned a pseudo-random number; the pseudo-random number of each DCT block is combined with the DCT quantization coefficient to calculate a fragile watermark containing 16 bits of information; the watermark is embedded in the DCT quantization coefficient to obtain a JPEG image containing a fragile watermark . During inspection, decode the brightness block DCT quantization coefficient of the target image; generate a pseudo-random matrix with the key K; then calculate the fragile watermark in the same way; extract the watermark in the DCT quantization coefficient of the photo to be tested and compare it with the calculated fragile watermark, If they are not equal, it is determined that the DCT block has been tampered with, and when all the DCT blocks of the image have not been tampered with, it is determined that the JPEG image has not been tampered with.

Description

technical field [0001] The invention relates to the fields of information hiding, digital watermarking, digital forensics, and tampering detection, in particular to a JPEG image tampering detection method based on a fragile watermark. Background technique [0002] With the development of digital media and Internet technology, it has become more and more common for individuals or organizations to publish or disseminate digital images on the Internet. Digital images have thus become an increasingly important and common information carrier and digital credential. However, the emergence and widespread use of image editing software such as Photoshop and Meitu has made digital image content easy to be edited, tampered with or even forged. The characteristics of easy tampering and forgery of digital images make them face information security hidden dangers and trust crisis when they are used as digital certificates. Existing digital images often lack data integrity protection tec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00H04L9/08
CPCG06T1/0042H04L9/0869G06T2201/0052G06T2201/0061G06T2201/0065G06T2210/32H04L2209/608
Inventor 徐一波陈友斌
Owner 湖北微模式科技发展有限公司