WO2006099788A1 - The method of digital watermark and the corresponding device, and digital camera which can append watermark - Google Patents
The method of digital watermark and the corresponding device, and digital camera which can append watermark Download PDFInfo
- Publication number
- WO2006099788A1 WO2006099788A1 PCT/CN2006/000202 CN2006000202W WO2006099788A1 WO 2006099788 A1 WO2006099788 A1 WO 2006099788A1 CN 2006000202 W CN2006000202 W CN 2006000202W WO 2006099788 A1 WO2006099788 A1 WO 2006099788A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- image
- digital
- bits
- watermark
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0042—Fragile watermarking, e.g. so as to detect tampering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32283—Hashing
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/328—Processing of the additional information
- H04N2201/3281—Encryption; Ciphering
Definitions
- the present invention relates to a method and apparatus for embedding a watermark into a digital image, and a method and apparatus for verifying a digital image and a digital camera capable of embedding a watermark into a photograph taken, and more particularly to an addition of a watermark that can identify the authenticity of a digital image , verification method and device, and digital camera with watermarking device.
- Digital cameras have become very popular due to the increasing image quality and the increasingly simplified desktop PC interface. Digital cameras are capable of taking digital images, allowing you to transfer or print them to a color printer over the Internet. Today, digital cameras have become a must-have item in our lives. Today, with the increasing popularity of digital technology, it is not difficult to modify and edit digital photos with various software. This has facilitated the tampering with the information recorded in digital photos, especially for some insurance, contracts, and electronic evidence. Photographs such as notes, their true integrity is particularly important. Therefore, the problem of true integrity authentication of digital photos is brought about. Our solution to this problem is through the photo-fidelity built into the digital camera.
- Digital watermarking technology can effectively prevent digital images from being forged.
- Digital watermarking technology has two branches for different purposes: one is a robust watermark, which is used to protect the author's copyright, and is used to provide legal basis in the event of a copyright dispute; one is a fragile watermark (or semi-fragile watermark), It is used to detect whether a multimedia work has been maliciously altered or damaged.
- a fragile watermark or semi-fragile watermark
- the literature [2] proposes to use the checksum method to calculate the eigenvalues of an image. This does not guarantee the authenticity of the image as it does with the hash algorithm. Because of the use of the checksum method, it is possible that the image has changed and the calculated value is the same.
- the patent in [3] divides the image into two regions, calculates the hash value from one region of the image, and then embeds the obtained hash value into another region of the image using the pixel block encoding method, and then uses the region combining unit. Combine the two areas.
- the biggest drawback of this method is that it cannot locate the area where the image has been tampered with.
- Document [4] proposes a public key watermarking method for image authentication.
- This digital image watermarking algorithm utilizes image segmentation to locate tamper-evident regions.
- This method of segmenting image processing if used on a digital camera, will greatly reduce the speed of the digital camera, so it is used in digital cameras. The practicality is not ideal.
- the invention provides a method and a device for adding and verifying a watermark in a digital image, and a method for adding and verifying a digital image watermark, and a digital camera with a watermarking device, and a watermarking device
- Digital cameras photos taken with such digital cameras, can verify their true integrity. When the picture is edited, modified, added or deleted, it can be confirmed that the photo has been changed by verifying the true integrity of the picture, thus realizing the fidelity of the digital photo, making the digital photo possible as electronic evidence.
- the first invention provides a method of adding a watermark to a digital image.
- the method has: acquiring data values representing each pixel of the digital image; dividing the data of each pixel in the recorded digital image into bits for calculating image feature values, hiding watermark bits, and positioning the bits of the tamper region, Bit calculation graph for calculating image feature values in digital images
- the step of characterizing the image; the step of setting the bit of the tampering region to 0 (or set), ie, the step of initializing; encrypting the calculated feature value, and hiding the encrypted image in the digital image using the fragile digital watermarking technique The step of the feature value.
- the second invention provides a method of verifying the true integrity of a digital image.
- the method has the steps of: recording, by the bit, the data of each pixel in the digital image as a bit for calculating an image feature value, a bit of the hidden watermark, and a bit for locating the tampering region, and calculating an image by using a bit in the digital image to calculate an image feature value.
- the step of extracting the hidden watermark information from the bits of the image hiding watermark; the step of decrypting the extracted information; the step of locating the tamper region; and comparing whether the calculated feature value and the decrypted information are equal The steps, if they are equal, and the tampering area of the image is not located, indicating that the image has not been tampered with, otherwise the authenticity of the photo is not guaranteed. At this time, we can also give the tampering area of the image.
- a third invention provides an apparatus for adding a watermark to a digital image.
- the device has: means for obtaining a data value representing each pixel of the digital image; for dividing the data of each pixel in the recorded digital image into bits for calculating image feature values, hiding watermark bits and locating tampering a device for locating a region, a device for calculating a feature value of an image by calculating a bit of an image feature value in a digital image; a device for setting a bit of the tamper region to 0 (or set) to initialize the device for locating the tamper region; A device for encrypting feature values, and a device for hiding an encrypted feature value in a digital image using a fragile digital watermark technique.
- the fourth invention provides an apparatus for verifying the true integrity of a digital image.
- the device has: means for bit-recording data of each pixel in the recorded digital image as a bit for calculating an image feature value, a bit of a hidden watermark, and a bit for locating the tampering region, and calculating a bit of the image feature value in the digital image Means for calculating a feature value of an image; means for extracting hidden watermark information from the image; means for decrypting the extracted information; means for locating the tamper region; and means for comparing whether the calculated feature value and the decrypted information are equal If they are equal, and the tampering area of the image is not located, the image is true and has not been tampered with. Otherwise, the authenticity of the photo is not guaranteed. At this time, we can also give the tampering area of the image.
- the digital camera After converting the received analog signal into a digital signal, the digital camera divides the data of each pixel in the recorded digital image into bits for calculating the image feature value, the bit of the hidden watermark, and the bit of the positioning tampering region, and then utilizes An algorithm for calculating eigenvalues such as SHA-1, MD5, CRC16, CRC32, or CRC-CCITT that computes a unique eigenvalue of the bit used to compute the image feature value in the digital signal, and then computes it using private key cryptography
- the feature value is then embedded into the bit of the digital signal hidden watermark by using the fragile watermarking technique, and then all the bits of the positioning tampering area are set to 0 (or set to 1), and then imaged into a lossless format digital photo.
- the bit of the tampering area of the positioning image becomes 1 (or becomes 0), the corresponding area has been tampered with.
- the calculated hash value and the decrypted iceprint information are compared. If they are equal, and the tampering area of the photo is not located, the photo is true, otherwise the photo has been tampered with. At this time, we can locate the image. When the value at the tampering area position becomes 1, the area where the photo has been tampered with is located, thereby completing the authentication of the photo.
- the digital camera with watermarking device of the present invention includes a watermark adding system in a digital camera and a corresponding photo verification method.
- a system for adding a watermark in a digital camera includes: means for acquiring a digital signal signal value, a bit dividing means, means for initializing a tampering area, means for calculating a feature value, an encrypting means, and a watermark embedding means.
- the process of photo verification including reading of digital signals, identifying corresponding bits, obtaining a unique eigenvalue of the digital signal through a corresponding algorithm for calculating eigenvalues, and extracting a hidden watermark from the digital signal using a corresponding fragile digital watermarking technique Information, decrypting the extracted watermark information, locating the tamper region, comparing the calculated feature value, and the decrypted watermark information. If the two are equal, and the tampering region of the photo is not located, the photo is true and has not been tampered with. Otherwise, the true integrity of the photo is not guaranteed. At this time, we can use the corresponding method to locate the area where the photo has been tampered with.
- the system for adding a watermark in a digital camera of the present invention includes:
- the analog signal converted into a digital signal.
- the bit dividing means is configured to bitwise divide the data of each pixel in the recorded digital image into bits for calculating image feature values, bits for hiding the watermark, and bits for locating the tamper region.
- the encryption device encrypts the calculated feature value with the private key.
- the watermark embedding device embeds the encrypted feature value into the bit of the digital signal hiding watermark by using a fragile digital watermarking technique.
- the method of photo verification can be seen as the reverse of the operation performed by the watermark adding device:
- the first step is to read the digital signal, first recovering the digital signal from the lossless format photo.
- the second step records the data of each pixel in the digital image by bit as the bit of the image feature value, the bit of the hidden watermark, and the location tampering.
- the third step uses the corresponding algorithm for calculating the eigenvalues for calculating the data in the bits of the image feature value to obtain a unique eigenvalue of the digital signal.
- the fourth step is to extract the hidden watermark information from the bits of the digital signal hidden watermark by using the corresponding fragile digital watermarking technique.
- the fifth step is to decrypt the extracted watermark information by using the public key.
- the sixth step is to locate the tampering area of the photo and find the area where the value of the tampering area is 1 (or 0).
- the seventh step is to compare the obtained hash value with the decrypted watermark information. If the two are equal, and the tampering area of the photo is not located,
- the calculated feature value is matched with the embedded feature value. If the bits of the hidden watermark and the bits of the position of the tampering area are filled with color signals such as black or white, then such data can be entered entirely into the algorithm for calculating the eigenvalues. This ensures correct verification results even after embedding data.
- the digital camera of the embodiment can also hide information such as the ID of the camera, the date of the shooting, the position measured by the GPS, and the like in the photograph taken. It should be noted that after we obtain the digital signal of the digital camera, we must first embed the information into the digital signal ready to calculate the eigenvalue, and then calculate it. Otherwise it will affect the results of photo verification. ,
- the present invention employs an appropriate algorithm for calculating eigenvalues, the calculated eigenvalues are unique.
- the digital signal is input into the algorithm for calculating the eigenvalue, and then its unique eigenvalue is calculated. Finally, the digital photo is saved in a lossless manner during imaging, which ensures that the photo can be correctly detected even if a point is changed. This provides a good guarantee for the correctness of the true integrity certification of digital photos.
- the present invention divides the information of each pixel in a digital signal into three parts in a bit, and a part is used as a unique feature for generating a digital signal.
- the present invention successfully hides data information from image visual insensitivity according to human visual characteristics when embedding feature values.
- the area ensures that the visual difference between the images before and after embedding the watermark is minimal.
- the security of the algorithm is improved, so that even if the watermark algorithm is disclosed, the others cannot simulate the embedding of the watermark because they do not have the private key embedded in the watermark.
- the public key allows anyone to verify the true integrity of the photo, making it more versatile.
- Figure 1 is a diagram of the apparatus within the digital camera of the present invention.
- FIG. 2 is a flow chart of a method for verifying a photo of the present invention
- Figure 3 is a photo taken with a digital camera with a watermarking device
- Figure 4 is the verification result of Figure 3.
- Figure 5 is a photo of Figure 3 after being tampered with
- Figure 6 is the verification result of Figure 5 and the falsified area
- a digital camera with a watermarking device comprising: means for obtaining a digital signal value, the device for reading a digital signal
- the digital signal is a digital signal converted from an optical signal to an analog signal in the digital camera; a bit dividing device configured to bitwise divide the data of each pixel in the recorded digital image into bits for calculating the image feature value, a bit that hides the watermark and a bit that locates the tamper region; initializes a device that locates the tamper region, the device sets all of the data on the bits of the image tampering region to a fixed value, such as all 0s or all ones, to facilitate verification Positioning the tampered region of the image; means for calculating the feature value, the device for calculating a unique feature value of the input digital signal based on the bit of the image feature value calculated in the digital image; the encrypting device, the device encrypting the calculation using the private key The feature value; the watermark embedding device, which uses the fragile digital watermarking technique to embed the encrypted feature value into the bit of the digital signal hiding watermark.
- the steps to verify the operation of a digital photo are as follows:
- the first step is to read the digital signal, first returning the digital signal from the lossless format photo.
- the second step records the data of each pixel in the digital image as the bit of the image feature value, the bit of the hidden watermark, and the bit of the tampering region.
- the third step is to calculate the bit data of the image feature value according to the digital image. Run the corresponding method of calculating the eigenvalue to obtain the unique eigenvalue of the digital signal.
- the fourth step is to extract the hidden watermark information from the bits of the digital signal hidden watermark by using the corresponding fragile digital watermarking technique.
- the fifth step is to decrypt the extracted watermark information using the public key.
- the sixth step is to locate the falsified area of the image, and record the position of the value different from the value assigned to the corresponding position in the tampering area to obtain the tampering area of the image.
- the seventh step is to compare the obtained feature value with the decrypted watermark information. If the two are equal, and the tampering area of the photo is not located, then the photo is true and has not been tampered with, otherwise the photo has been tampered with, and at the same time We can give the area where the photo has been tampered with.
- the digital signal processed is the YUV data in the 8-4-1 format.
- YUV is a color coding method
- YUV data in 8-4-4 format where "8-4-4" refers to the arrangement of YUV data.
- the actual application is not limited to this.
- a digital signal of an image such as image data in RGB format
- the feature value of the image, the rest of the data is used as the calculation of the feature value, and so on.
- the lowest bit of the Y value to locate the tamper region, and the second lowest bit of the Y value embeds the encrypted feature value, and the rest of the data is used to calculate the feature value of the image.
- the actual application is not limited to this. Theoretically, as long as the data of the eigenvalues, the data embedded in the cryptographic feature values, and the data of the occlusion tampering area cover all the data bits of all the pixels, and the bits of the tampering area are involved in all the pixels, it is necessary to ensure that Enough space to hide encrypted feature values.
- the method of dividing data must ensure the quality of the image and cannot cause perceptible changes. For example, we choose to modify the data on the lowest and the second lowest of the Y value, based on this consideration, try not to make the image quality have a significant change.
- each bit of each pixel is used here is to make a random change of one pixel detectable. But if the user knows that the possible changes are more than one pixel, or if he only wants to detect a change in a region, then the rate of change of pixels and bits can be reduced accordingly. For example, it is not necessary to set each pixel to a bit that locates the tampering region, and a combination of three portions does not need to cover each bit of all pixels.
- Obtaining a value of a digital signal signal for reading out a digital signal the digital signal being a digital signal converted from an optical image into an analog signal in the digital camera for digitizing data of each pixel in the recorded digital image Divided into a computed image bit division device
- the unique eigenvalue is calculated.
- the cryptographic device uses the unique eigenvalue extracted by the private key cryptography to embed the calculated eigenvalue into the digital signal using the fragile digital watermarking technique.
- Figure 3 is a photograph taken with a digital camera having the apparatus of the present invention, which is a scene of a serious traffic accident, which we use as an example.
- the digital camera we first convert the optical image into an analog signal using CCD or CMOS, and then the A/D converter converts the obtained analog signal into a digital signal.
- the received digital signal is a TOV data stream in the 8-4-4 format. Then, we set the LSB bit (least significant bit) of each Y value in the YUV data stream to 0, which is used as the bit to locate the tampering image area. After that, we set all the data in the lower Y position of the YUV data stream to 0.
- Figure 4 is a verification result of the digital photograph of Figure 3.
- the YUV data stream of the 2-1-1 format is read from the digital photo in the TIF format, and then the YUV data stream of the 2-1-1 format is converted into the YUV data stream of the 8-4_4 format, after which we put The YUV data stream of the 8-4-4 format is copied into an array.
- we set the LSB bit and the lower low bit of each Y value data in the array to 0, and then obtain the 160 of the array by the SHA-1 algorithm.
- the bit hash value expressed in hexadecimal, is "E6C2BD995EDCF316887EFD24EC5492A8C2991C53".
- Figure 5 is an example of tampering with the photo shown in Figure 3.
- This kind of change to the electronic version of the photo is very simple and easy to implement, but for taking pictures of this kind of document or taking photos as electronic evidence, its authenticity is an issue we urgently need to know.
- Fig. 6 is a result of verification of the falsified digital photograph shown in Fig. 5.
- the YUV data stream of the 2-1-1 format is read from the digital photo in the TIF format, and then the YUV data stream of the 2-1-1 format is converted into the YUV data stream of the 8-1-4 format.
- the 160-bit hash value expressed in hexadecimal, is "E5442CC3B4281EAAAAFBAD00BECAB7C957226E26".
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Image Processing (AREA)
- Editing Of Facsimile Originals (AREA)
- Studio Devices (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Description
Claims
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/887,052 US8175322B2 (en) | 2005-03-23 | 2006-02-06 | Method of digital watermark and the corresponding device, and digital camera which can append watermark |
| JP2008502224A JP2008536371A (ja) | 2005-03-23 | 2006-02-06 | デジタルイメージのウォーターマーク方法及び関連装置とウォーターマーク追加可能なデジタルカメラ |
| EP06705623A EP1865459A4 (en) | 2005-03-23 | 2006-02-06 | DIGITAL WATERMARK METHOD AND ASSOCIATED ARRANGEMENT, DIGITAL CAMERA THAT CAN INSERT A WATER TILE |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CNB2005100556808A CN100547608C (zh) | 2005-03-23 | 2005-03-23 | 数字图像水印的方法及相应装置和可添加水印的数码相机 |
| CN200510055680.8 | 2005-03-23 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2006099788A1 true WO2006099788A1 (en) | 2006-09-28 |
Family
ID=37015559
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2006/000202 Ceased WO2006099788A1 (en) | 2005-03-23 | 2006-02-06 | The method of digital watermark and the corresponding device, and digital camera which can append watermark |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US8175322B2 (zh) |
| EP (1) | EP1865459A4 (zh) |
| JP (1) | JP2008536371A (zh) |
| CN (1) | CN100547608C (zh) |
| WO (1) | WO2006099788A1 (zh) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20090034852A1 (en) * | 2007-07-31 | 2009-02-05 | Chris Brock | Method and System for Identifying the Source of an Image |
Families Citing this family (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2008128383A1 (fr) * | 2007-04-23 | 2008-10-30 | Aigo Research Institute Of Image Computing Co., Ltd | Caméra numérique et son système d'acquisition d'informations de filigrane par le biais d'un dispositif externe |
| WO2008128384A1 (en) * | 2007-04-24 | 2008-10-30 | Aigo Research Institute Of Image Computing Co., Ltd | A smart card and a method for adding digital watermark to the interior data of the smart card |
| CN101882295B (zh) * | 2009-05-04 | 2013-12-25 | 北京华旗资讯数码科技有限公司 | 基于fpga实现的数字水印添加装置及数码相机 |
| CN101883200A (zh) * | 2009-05-04 | 2010-11-10 | 北京华旗资讯数码科技有限公司 | 基于fpga实现的鲁棒数字水印添加装置及数码相机 |
| CN102024245B (zh) * | 2009-09-10 | 2013-03-27 | 广州市百成科技有限公司 | 一种基于易碎水印技术的电子印章保护方法 |
| CN101840564B (zh) * | 2010-05-07 | 2011-09-14 | 南京大学 | 一种利用遥感影像进行海量信息隐藏的方法 |
| CN102270335A (zh) * | 2010-06-03 | 2011-12-07 | 三星电子(中国)研发中心 | 一种在图像中嵌入附加信息的方法和装置 |
| CN102184516B (zh) * | 2011-04-18 | 2012-08-15 | 北京工业大学 | 基于2dpca的数字水印方法 |
| CN103209288A (zh) * | 2012-01-11 | 2013-07-17 | 蒋牛 | 具有时空信息及原始性标识的数字影像拍摄装置 |
| US20160379330A1 (en) * | 2013-06-21 | 2016-12-29 | Signs & Wonders Unlimited, Llc | Method and apparatus for protecting digital photos from alteration |
| CN104349106B (zh) * | 2014-10-31 | 2018-11-02 | 广东威创视讯科技股份有限公司 | 处理、获取多路视频信号的方法及其系统 |
| CN105139335A (zh) * | 2015-10-13 | 2015-12-09 | 蒋铭 | 图像版权标识与篡改检测系统 |
| US10211989B2 (en) | 2016-02-05 | 2019-02-19 | Mcafee, Llc | Trusted indicators to secure visual outputs |
| US10698986B2 (en) * | 2016-05-12 | 2020-06-30 | Markany Inc. | Method and apparatus for embedding and extracting text watermark |
| CN106506169A (zh) * | 2016-12-08 | 2017-03-15 | 芜湖市振华戎科智能科技有限公司 | 一种基于水印和认证服务器的加密光盘系统 |
| US10630483B2 (en) | 2017-10-23 | 2020-04-21 | Legitipix, LLC | Anonymous image/video digital signature insertion and authentication |
| CN110943839A (zh) * | 2018-09-21 | 2020-03-31 | 珠海金山办公软件有限公司 | 一种签名验证方法、装置、电子设备及可读存储介质 |
| US10902541B2 (en) | 2018-10-23 | 2021-01-26 | International Business Machines Corporation | Watermarking a digital image |
| KR102949941B1 (ko) * | 2019-10-10 | 2026-04-07 | 삼성전자주식회사 | 이미지 백업을 수행하는 컴퓨팅 시스템 및 이미지 백업 방법 |
| CN113450244B (zh) * | 2020-03-26 | 2025-11-25 | 阿里巴巴集团控股有限公司 | 一种数据处理方法及装置 |
| CN119515655A (zh) * | 2021-04-06 | 2025-02-25 | 王可 | 实现海量大数据图像安全融合方法 |
| US20240242284A1 (en) * | 2023-01-18 | 2024-07-18 | Christiana Cacciapuoti | Steganographic asset validation |
| CN120614425B (zh) * | 2025-08-07 | 2025-10-24 | 一智科技(成都)有限公司 | 一种施工场景的图像信息记录方法、装置及介质 |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1184294A (zh) | 1996-11-28 | 1998-06-10 | 国际商业机器公司 | 向图象嵌入鉴定信息的系统及图象改变检测系统 |
| US6285775B1 (en) * | 1998-10-01 | 2001-09-04 | The Trustees Of The University Of Princeton | Watermarking scheme for image authentication |
| JP2001268339A (ja) * | 2000-03-16 | 2001-09-28 | Hitachi Ltd | 画像への情報埋め込み方法及び抽出方法 |
| WO2001080169A1 (en) * | 2000-04-17 | 2001-10-25 | Digimarc Corporation | Authentication of physical and electronic media objects using digital watermarks |
| CN1450495A (zh) * | 2002-03-29 | 2003-10-22 | 佳能株式会社 | 图像处理装置及方法 |
| US6725372B1 (en) * | 1999-12-02 | 2004-04-20 | Verizon Laboratories Inc. | Digital watermarking |
| US20060080743A1 (en) | 2004-10-13 | 2006-04-13 | Microsoft Corporation | Secure image authentication with discrete level tamper localization |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2000152148A (ja) * | 1998-11-13 | 2000-05-30 | Hitachi Ltd | 電子カメラ |
| JP2000295454A (ja) * | 1999-04-05 | 2000-10-20 | Hitachi Ltd | 電子透かし装置及び方法並びに記録媒体 |
| JP4454920B2 (ja) * | 2002-09-24 | 2010-04-21 | キヤノン株式会社 | 画像検証システムおよび画像検証プログラム |
-
2005
- 2005-03-23 CN CNB2005100556808A patent/CN100547608C/zh not_active Expired - Fee Related
-
2006
- 2006-02-06 JP JP2008502224A patent/JP2008536371A/ja not_active Ceased
- 2006-02-06 WO PCT/CN2006/000202 patent/WO2006099788A1/zh not_active Ceased
- 2006-02-06 US US11/887,052 patent/US8175322B2/en not_active Expired - Fee Related
- 2006-02-06 EP EP06705623A patent/EP1865459A4/en not_active Withdrawn
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1184294A (zh) | 1996-11-28 | 1998-06-10 | 国际商业机器公司 | 向图象嵌入鉴定信息的系统及图象改变检测系统 |
| CN1091329C (zh) * | 1996-11-28 | 2002-09-18 | 国际商业机器公司 | 向图象嵌入鉴定信息的系统及图象改变检测系统 |
| US6285775B1 (en) * | 1998-10-01 | 2001-09-04 | The Trustees Of The University Of Princeton | Watermarking scheme for image authentication |
| US6725372B1 (en) * | 1999-12-02 | 2004-04-20 | Verizon Laboratories Inc. | Digital watermarking |
| JP2001268339A (ja) * | 2000-03-16 | 2001-09-28 | Hitachi Ltd | 画像への情報埋め込み方法及び抽出方法 |
| WO2001080169A1 (en) * | 2000-04-17 | 2001-10-25 | Digimarc Corporation | Authentication of physical and electronic media objects using digital watermarks |
| CN1450495A (zh) * | 2002-03-29 | 2003-10-22 | 佳能株式会社 | 图像处理装置及方法 |
| US20060080743A1 (en) | 2004-10-13 | 2006-04-13 | Microsoft Corporation | Secure image authentication with discrete level tamper localization |
Non-Patent Citations (6)
| Title |
|---|
| GL.FRIEDINAN: "The trustworthy digital camera restoring credibility to the photographic image", IEEE TRANS, CONSUMER ELECTRON, vol. 39, November 1993 (1993-11-01), pages 905 - 910 |
| JINHAI WU ET AL., INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, vol. 3, 24 October 2004 (2004-10-24) - 27 October 2004 (2004-10-27), pages 1573 - 1576 |
| PING WAH WONG, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, vol. 1, 4 October 1998 (1998-10-04), pages 455 - 459 |
| S . WALTON: "Information authentication for a slippery new age [J]", DR. DOBBS JOURNAL, vol. 20, no. 4, 1995, pages 18 - 26 |
| See also references of EP1865459A4 * |
| WONG P W.: "A public key watermark for image verification and authentication [A]", PROC OF THE IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP'98) [C], vol. 1, 1998, CHICAGO, ILLINOIS, USA, pages 455459 |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20090034852A1 (en) * | 2007-07-31 | 2009-02-05 | Chris Brock | Method and System for Identifying the Source of an Image |
Also Published As
| Publication number | Publication date |
|---|---|
| CN1838172A (zh) | 2006-09-27 |
| EP1865459A4 (en) | 2009-09-02 |
| US8175322B2 (en) | 2012-05-08 |
| JP2008536371A (ja) | 2008-09-04 |
| CN100547608C (zh) | 2009-10-07 |
| EP1865459A1 (en) | 2007-12-12 |
| US20090022358A1 (en) | 2009-01-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2006099788A1 (en) | The method of digital watermark and the corresponding device, and digital camera which can append watermark | |
| US7251343B2 (en) | Image protection | |
| Rey et al. | A survey of watermarking algorithms for image authentication | |
| Guo et al. | A region-based lossless watermarking scheme for enhancing security of medical data | |
| EP1020076B1 (en) | Watermarking of digital object | |
| JP4602931B2 (ja) | 画像セットの完全性を保証する方法 | |
| US8055014B2 (en) | Bi-directional image capture methods and apparatuses | |
| JP4313873B2 (ja) | 電子機器及びデータ処理方法 | |
| JP4097773B2 (ja) | デジタル画像編集システム | |
| Zain et al. | Reversible region of non-interest (RONI) watermarking for authentication of DICOM images | |
| US20040145661A1 (en) | Image processing method, and image processing apparatus | |
| CN101694724A (zh) | 在数码相机jpeg图像中嵌入gps信息并确保图像安全的方法 | |
| JP2010158024A (ja) | データオブジェクトのフィンガープリンティング | |
| Thiyagarajan et al. | Reversible dynamic secure steganography for medical image using graph coloring | |
| US6741722B2 (en) | Verification data encoding method, original image verification method and apparatus, and computer readable medium | |
| US7003666B1 (en) | Apparatus and method for embedding information for tamper detection and detecting tamper and recording medium having program for carrying out the method recorded thereon | |
| CN1991901A (zh) | 一种嵌入指纹水印信息的方法和装置 | |
| JP2003092676A (ja) | データ処理方法及び装置とそのプログラム及び記憶媒体 | |
| AU2002318848B2 (en) | Image Protection | |
| Zain et al. | Reversible watermarking surviving jpeg compression | |
| JP2003304387A (ja) | 画像管理システム,電子透かし埋め込み装置,認証コード管理装置,電子透かし検出装置,及び,画像管理方法 | |
| CN120387153A (zh) | 一种基于区块链盐值映射的数字水印生成与可信验证方法 | |
| JP2007028402A (ja) | 画像処理方法、装置、プログラムおよび記録媒体 | |
| Zain | Digital watermarking in medical images | |
| Lei et al. | A color image authentication system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| WWE | Wipo information: entry into national phase |
Ref document number: 2008502224 Country of ref document: JP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 11887052 Country of ref document: US |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2006705623 Country of ref document: EP |
|
| NENP | Non-entry into the national phase |
Ref country code: RU |
|
| WWW | Wipo information: withdrawn in national office |
Country of ref document: RU |
|
| WWP | Wipo information: published in national office |
Ref document number: 2006705623 Country of ref document: EP |
