Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks

A digital image and authentication method technology, which is applied in image data processing, image data processing, instruments, etc., can solve the problems of redundant, vulnerable to constant mean attack, non-smooth image block recovery quality, and low positioning accuracy

Inactive Publication Date: 2011-06-22
SOUTHWEST JIAOTONG UNIV
View PDF2 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are two most commonly used methods for generating and restoring watermarks: ① Quantization and encoding of important DCT (discrete cosine transform) coefficients of 8×8 image blocks, the disadvantage of which is low positioning accuracy
② The average value of 2×2 image blocks has high positioning accuracy, but it is vulnerable to constant average value attacks and the recovery quality of non-smooth image blocks is not good
But saving the texture features of the image block will increase the watermark capacity, and adding texture features to smooth blocks like B1 is redundant

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks
  • Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks
  • Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0056] A variable-capacity watermark generation and authentication method with recoverable tampered content of a digital image, including four parts: watermark generation and embedding, watermark extraction and comparison, tampering detection and tampering recovery.

[0057] A. Watermark generation and embedding

[0058] figure 1 It is a block diagram of specific steps of watermark generation and embedding in the method of the embodiment of the present invention, including the following five steps:

[0059] A1. Image block and classification: Divide the original image X with a size of 2m×2n into m×n non-overlapping 2×2 image blocks X i ={x i1 , x i2 , x i3 , x i4}, wherein, i is the image block number, i=1, 2, ..., N, N=m×n is the number of image blocks; and the image blocks are divided into smooth image blocks and non-smooth images according to the content of the image blocks Two types of blocks;

[0060] Image block classification in this embodiment: for 2×2 image blo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for generating and authenticating digital image tampered content recoverable variable capacity watermarks, which comprises the following steps of: dividing 2*2 image blocks into smooth image blocks and non-smooth image blocks, extracting 6bit characteristics from the smooth image blocks, extracting 12bit characteristics from the non-smooth image blocks, encrypting the characteristics of the image blocks to generate image block recovery watermarks, randomly embedding the image block recovery watermarks into other image blocks, and judging the authenticity of the image blocks by comparing the consistency of the characteristics of the image blocks and combining block neighborhood characteristics. For the judged tampered image blocks, different tampering recovery operations are executed in two steps according to whether the corresponding recovery watermarks of the image blocks are tampered to improve the tampering recovery quality. The variable capacity recovery watermarks are generated according to the personal characteristics of the image blocks, and the recovery watermarks are simultaneously used for tampering positioning and tampering recovery, so the watermark embedding capacity is reduced when enough image characteristics are ensured, and watermark-containing image quality and tampering recovery quality are considered; and meanwhile, the security is improved, and known forging attacks such as joint attack, mean attack and the like can be resisted.

Description

technical field [0001] The invention relates to a generation and authentication method of an authentication watermark whose tampered content of a word image can be recovered, which is used for detecting the authenticity and integrity of a digital image and recovering the tampered image. Background technique [0002] With the development of computer, digital imaging and network communication technology, digital image has become the main source for people to obtain and exchange information and one of the important carriers of information dissemination. The digital storage of images and the emergence of various image processing software make the editing, modification and synthesis of digital images very simple. Digital image processing technology has improved the display quality of images, but tampering and forgery of images, if used in news media, court evidence, scientific discoveries, etc., will bring serious damage to the integrity of the society, the credibility of the gov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T1/00
Inventor 和红杰陈帆
Owner SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products