CN102622545A - Picture file tracking method - Google Patents

Picture file tracking method Download PDF

Info

Publication number
CN102622545A
CN102622545A CN2012100505149A CN201210050514A CN102622545A CN 102622545 A CN102622545 A CN 102622545A CN 2012100505149 A CN2012100505149 A CN 2012100505149A CN 201210050514 A CN201210050514 A CN 201210050514A CN 102622545 A CN102622545 A CN 102622545A
Authority
CN
China
Prior art keywords
watermark
picture file
image
sequence
sub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012100505149A
Other languages
Chinese (zh)
Other versions
CN102622545B (en
Inventor
周尚波
蒋镇波
刘一鸣
罗捷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University
Original Assignee
Chongqing University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University filed Critical Chongqing University
Priority to CN201210050514.9A priority Critical patent/CN102622545B/en
Publication of CN102622545A publication Critical patent/CN102622545A/en
Application granted granted Critical
Publication of CN102622545B publication Critical patent/CN102622545B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses a picture file tracking method, which is characterized by including the following steps: A, installing an insert in a computer, wherein the insert is used for monitoring file operation performed by the computer; B, monitoring the file operation performed by the computer through the insert and obtaining a digital signature when the insert detects that the computer performs a picture file; C, judging whether the picture file is already added with watermarks, and entering step E if the picture file is already added with watermarks, otherwise entering step D; D, adding watermarks: using the digital signature, public keys corresponding to private keys of a current operation user and original text of the signature as watermark information, adding the watermark information into the picture file and returning to step B; and E, watermark replacing: extracting watermarks of the picture file already added with watermarks and returning to step D. The picture file tracking method can be widely used in intranets based on public key infrastructure (PKI) so as to track secret divulging sources of important files.

Description

The picture file method for tracing
Technical field
The present invention relates to picture file and handle, and be specifically related to the picture file method for tracing.
Background technology
The develop rapidly of Along with computer technology, information network have become the important assurance of social development.Yet,, inevitably produced some potential safety hazards uplifting the people's living standard and the efficient behind.Information network relates to numerous areas such as the government, military affairs, culture and education of country, and storage, transmission and many information of handling are important information such as government macro-control decision-making, commercial economy information, bank capital are transferred accounts, share certificate, energy resources data, scientific research data.Wherein having much is sensitive information, or even state secret, so can attract the various artificial attack from all over the world unavoidably, for example leakage of information, information are stolen, data tampering, data delete add, computer virus etc.Usually utilize computer crime to be difficult to stay evidence of crime, this has also stimulated the generation of computing machine hi-tech crime case greatly.Increasing sharply of computer crime rate, the computer system that makes various countries particularly network system is faced with very big threat, and becomes one of serious social concern.
And under such background, the demand in epoch is also complied with in the generation of PKI technology.PKI (Public Key Infrastructure) i.e. " PKIX "; It is a kind of key management platform of following set standard; It can use cryptographic service and necessary key and certificate management systems such as encryption and digital signature are provided for all-network; In simple terms, PKI is exactly the infrastructure that security service is provided of utilizing the PKI theory and technology to set up.The PKI technology is the core of information security technology, also is the key and the basic technology of ecommerce.The basic technology of PKI comprises encryption, digital signature, data integrity mechanism, digital envelope, dual digital signature etc.Under the environment of PKI, we can guarantee the authenticity and integrity of file, and a series of authentication functions are provided, thereby reliable assurance are provided for our track algorithm.
On the other hand, the proposition of digital watermark technology makes that we can be with the Information hiding of need to be keep secret in the picture that needs are followed the tracks of, thereby better guarantees the transparency of technology.Digital watermarking (Digital Watermarking) technology is to be that digital watermarking directly embeds in the middle of the digital carrier with some identification informations; Perhaps secondary indication is in the middle of digital carrier; As revise the structure of specific region; And do not influence the use value of original vector, be not easy to be found out yet and revise once more.But can be by producer identification and identification.Be hidden in the information in the carrier through these, can reach and confirm creator of content, buyer, transmission secret information or judge whether carrier purpose such as is distorted.The utilization digital watermark technology, can be effective and transparent the secret picture file is followed the tracks of.
Hook (Hook) is a platform of windows messaging treatment mechanism, and application program can be provided with sub-journey certain message with the supervision specified window in the above, and the window of being kept watch on can be that other processes are created.After message arrives,, target window handles it before handling function.Hook Mechanism allows application program to intercept and capture and handles window message or particular event.Each Hook has a pointer list associated therewith, is referred to as the hook chained list, is safeguarded by system.The pointed appointment of this tabulation, application program definition, the call back function that is called by the sub-journey of Hook, just each of this hook handled sub-journey.When the message with the Hook type association of appointment took place, system just was delivered to the sub-journey of Hook to this message.The sub-journey of some Hook can only be kept watch on message, perhaps revises message, perhaps stops to advance of message, avoids these message to be delivered to sub-journey of next Hook or purpose window.The hook of installation is placed on the beginning of chain recently, and the hook of installing the earliest is placed at last, the control of acquisition earlier of back adding just.Windows does not also require that the unloading order of the sub-journey of hook must be opposite with erection sequence.Whenever there being a hook to be unloaded, Windows just discharges its internal memory that takies, and upgrades whole Hook chained list.If program has been installed hook, but before unloading hook as yet, just be not through with, system can do the operation of unloading hook automatically for it so.
So far; The present invention proposes the method for tracing of secret picture; It is based on digital watermark and PKI infrastructure; Prevent that the secret picture file from being leaked by the LAN unauthorized user, solve, the function that provides the secret picture file to divulge a secret a record for the service side in the application system because the incident of " unauthorised copies ", " system manager divulges a secret " and " network data spy " causes problems such as information-leakage; Guarantee that the user of secret picture file in LAN has good grounds, and be convenient to when important picture is divulged a secret generation, play the effect of proof.
Summary of the invention
Technical matters to be solved by this invention provides a kind of picture file method for tracing that utilizes PKI technology and digital watermark technology to realize.
According to technical scheme of the present invention, the picture file method for tracing is characterized in: said method comprises the steps:
A., plug-in unit is installed in computing machine; The file operation that plug-in unit is used for this machine is carried out is monitored; As newly-built, move, duplicate etc.; No matter be that client is from the downloaded vital document or with important picture document copying to USB flash disk or other memory devices, plug-in unit can both detect;
B. plug-in unit is monitored the file operation that this machine carried out; When plug-in unit detects this machine picture file is operated, obtain digital signature; Be specially:
B1, read the information of this machine, like MAC Address, hard disc physical sequence number and system time, with the information of this machine as the signature original text;
B2, the original text of will signing carry out hash transformation, obtain informative abstract;
B3, the current operation of utilization user's private key, and adopt the AES in the public and private key encryption and decryption system that informative abstract is encrypted, obtain digital signature;
C. judge whether this picture file has added watermark, when this picture file has added watermark, get into step e, when this picture file does not add watermark, get into step D,
D. add watermark:
PKI that digital signature and current operation user's private key is corresponding and signature original text be simultaneously as watermark information, joins in the picture file that this machine operates, and returns step B;
In this step, the validity of signed data when signing in order to guarantee to test in the future, the label PKI of testing corresponding during with signature is together preserved, and in the time of can avoiding certifying signature, user key is changed or expired problem;
E. watermark replacement:
Watermark extracting in the picture file that adds watermark is gone out, return step D.
Carry out the watermark replacement, can guarantee that this picture file comprises last user's information all the time, so that check the information of divulging a secret in the future;
According to the preferred version of a kind of picture file method for tracing of the present invention, when the generation picture file leaks, also comprise the step of testing label, be specially:
Watermark extracting in the picture file of divulging a secret that F1. will obtain goes out, and original text, digital signature and the PKI corresponding with signature private key obtain signing;
F2. the original text of will signing carries out hash transformation, obtains informative abstract; And digital signature and public signature key deciphering obtained another informative abstract;
F3, two informative abstracts that step F 2 is obtained compare, if two informative abstracts are identical, test to sign and pass through, and pass through if test to sign, the user profile and this machine information of the picture file that then obtains to divulge a secret; If two informative abstracts are inequality, test label and do not pass through; Label are obstructed out-of-date when testing, and think that watermark was modified, and the source of divulging a secret that then shows is wrong.
According to the preferred version of picture file method for tracing of the present invention, step D comprises:
D1. watermark information pre-service; Watermark information generally will carry out certain pre-service earlier before embedding; Purpose is to let the form of watermark information meet the requirement that embeds algorithm; Usually watermark information is made the bianry image form; And use reversible scrambling algorithm that each pixel is carried out scramble, make the watermark that extracts can not lose readability, thereby improve the robustness of algorithm because of slight attack.Watermark information also can bit stream form embed, then to divide into groups or zero padding in this case according to the bit stream that requires of algorithm;
D2. the image of picture file is done time-frequency conversion, with image from space field transformation to frequency field;
Because the watermark that embeds in frequency field has better invisibility and stronger robustness than the watermark that directly embeds in spatial domain.Therefore should at first do time-frequency conversion, image is transformed from a spatial domain to frequency field, and the transform method that adopts is a fractional order stochastic transformation algorithm the carrier image of input; This algorithm has characteristics such as linearity, unitarity, additive property, periodicity and energy conservation; Meet the requirement of digital watermarking algorithm, simultaneously, because used key has comprised a stochastic matrix and a random series in the watermark process; Key space is bigger, therefore has higher security;
D3. image block; In frequency field; According to the size of watermark information the image array of picture file is carried out piecemeal; The image array of picture file is divided into
Figure BDA0000139793360000051
sub-block; Wherein: n is the size of images of picture file; M is the size of watermarking images, and K is a perfect square number, (generally getting 1,4,9); The existence of K makes the size of sub-piece less than the size of watermarking images, the big square that the K sub-block in the image of the corresponding picture file of each pixel of watermarking images is formed;
D4. construct random number sequence as second key, preceding r big number is set to 1 (wherein r value and watermarking images is measure-alike) in the random number sequence, and remaining number is set to 0, obtains 01 sequence;
Because the number of sub-piece greater than the number of pixels of watermarking images, therefore has only the parton piece to participate in the embedding of watermark, and the effect of 01 sequence is exactly to be used for indicating which sub-piece to be chosen as and to treat the embedding carrier;
D5. watermark embeds
01 sequence that traversal step D4 constructs travels through every sub-block of the image of picture file synchronously, if the current element of 01 sequence is 1, then the sub-piece of correspondence is elected to be and treats the embedding carrier, embeds the watermark of a pixel; If the current element of 01 sequence is 0, then skip corresponding sub-piece, so go down, all be embedded in the image of picture file up to all watermark pixels;
The pixel of why selecting amplitude maximum in the current sub-block is as embedding point; Be because additive Gaussian noise is inversely proportional to certain vectorial interference and this vectorial amplitude; Therefore, the pixel of selecting to have big more amplitude embeds, and the watermark anti-jamming capacity will be strong more; Robustness is also just good more, can reduce watermark to greatest extent to the visual influence of former figure;
D6. time-frequency inverse transformation returns the image that is embedded with watermark to spatial domain from frequency domain transformation, makes image recover original vision content.This step need be used the inverse transformation of fractional order stochastic transformation, and this process only need can realize the opposite number that the conversion exponent number changes original exponent number into.
According to the preferred version of picture file method for tracing of the present invention, step D2 is specially and adopts fractional order stochastic transformation algorithm, and the image of picture file is done time-frequency conversion, with image from space field transformation to frequency field; Comprise:
D21. at first construct one at random real symmetric matrix
Figure BDA0000139793360000061
wherein P be exactly stochastic matrix as first key, T is a matrix transpose operator;
D22. calculate the eigenvectors matrix of real symmetric matrix:
Figure BDA0000139793360000062
V wherein RiBe Ri the eigenmatrix of real symmetric matrix Q;
D23. construct matrix of coefficients:
Figure BDA0000139793360000063
Wherein N is the height (or width) of image, and i is an imaginary unit, and α is the conversion exponent number, and M is transformation period;
D24. construct fractional order stochastic transformation matrix:
Figure BDA0000139793360000064
D25. use formula
Figure BDA0000139793360000065
Image is carried out time-frequency conversion, transform from a spatial domain to frequency field to image, wherein x and X RIt is respectively the image array before and after the video transformation.
According to the preferred version of picture file method for tracing of the present invention, step D5 embeds for carry out watermark according to following formula:
Figure BDA0000139793360000071
Wherein φ is the current phase value of treating the embedding pixel;
Figure BDA0000139793360000072
is the phase value behind the embed watermark, and θ is an insert depth.
According to the preferred version of picture file method for tracing of the present invention, the watermark extracting step comprises:
E1. to the image of water mark inlaying and not the original image of water mark inlaying do time-frequency conversion respectively, image is transformed from a spatial domain to frequency field; For the needs of watermarking algorithm with from the consideration of security, the original image of water mark inlaying should be when image be issued in specific main frame unified the file;
E2. in frequency field respectively to the image array of water mark inlaying and not the original image matrix of water mark inlaying carry out piecemeal; Be specially: in frequency field; According to the size of watermark information the image array of picture file is carried out piecemeal; The image array of picture file is divided into
Figure BDA0000139793360000073
sub-block; Wherein: n is the size of images of picture file, and m is the size of watermarking images, and K is a perfect square number;
E3. construct random number sequence as second key, preceding r big number is set to 1 (wherein r value and watermarking images is measure-alike) in the random number sequence, and remaining number is set to 0, obtains 01 sequence;
E4. extract watermark
Travel through all the sub-pieces and 01 sequence of the image of water mark inlaying synchronously, select the sub-piece of the image of the pairing water mark inlaying of 1 value element in 01 sequence; Simultaneously, travel through not all the sub-pieces and 01 sequence of the original image of water mark inlaying synchronously, select the sub-piece of the original image of the pairing not water mark inlaying of 1 value element in 01 sequence; For the selected sub-piece of the image of water mark inlaying and the selected sub-piece of the original image of water mark inlaying not, travel through its all pixels respectively, select the maximum pixel of amplitude wherein as extracting object, and the watermark pixel value current according to following Rule Extraction:
Figure BDA0000139793360000081
M wherein jBe j the watermark pixel value that extracts, μ is the phase value of the current vegetarian refreshments of original image of not water mark inlaying, and λ is the phase value of the image current pixel point of embed watermark, and θ is an insert depth, and T is an adjustable threshold; Can through to T the intensity of regulating watermark extracting specifically is set, T is big more, the more difficult extraction of watermark, but accuracy is also high more;
E5. watermark information aftertreatment
For the watermark that extracts, handle according to the pretreated inverse approach of watermark information, could recover the vision content of watermarking images like this, thereby obtain final watermarking information.
The leaching process of the watermarking algorithm that native system adopted needs the participation of initial carrier, through with the contrast of initial carrier, watermark information is extracted one by one, obtaining final watermark information through aftertreatment, the accuracy of the watermark that has guaranteed to be extracted.
The present invention mainly provides following two functions:
First: automatic, transparent signature and watermark operation
Automatically, transparent signature and watermark operation are meant that system moves the picture file on this machine; Duplicate; Save as with operation such as newly-built and monitor, and use current operation private key for user to this machine relevant information (like address name, this machine MAC Address of Network Card; This machine hard disk sequence number and system time etc.) sign; Signature value is embedded in the secret picture file through special watermarking algorithm, and wherein signature process is transparent to this machine user, i.e. user and do not know that system can be to the operation of file record to some extent.
Second: can test afterwards and sign and the inquiry leakage point
When the vital document incident of leakage had taken place, this document had related to the interests of individual and even company, can be who has leaked file through our system tracks, so that the evidence of investigating its legal liabilities to be provided.Because when signature generated, system had adopted this machine relevant information and user's private key, so can when test the label process, show and verify out leakage person's relevant information.Simultaneously, in the watermark operating process, added the information of client public key, to guarantee that the signature digital certificate crossing after date, still can be verified.
The beneficial effect of a kind of picture file method for tracing of the present invention is: through the detection to file operation, picture file is carried out watermark interpolation and signature, so that the file trend is followed the trail of; Have the function that provides the secret picture file to divulge a secret a record to the side of service, guarantee that the user of secret picture file in LAN has good grounds, and be convenient to when important picture is divulged a secret generation, play the effect of proof, can be widely used in each computer network.
Description of drawings
Below will combine accompanying drawing that embodiments of the invention are further described.
Fig. 1 is a kind of picture file method for tracing FB(flow block) of the present invention.
Fig. 2 is a signature FB(flow block) of the present invention.
Fig. 3 is the label FB(flow block) of testing of the present invention.
Fig. 4 is that watermark of the present invention embeds FB(flow block).
Fig. 5 is a watermark extracting FB(flow block) of the present invention.
Embodiment
Referring to Fig. 1, a kind of picture file method for tracing, said method comprises the steps:
A., plug-in unit is installed in computing machine, after computing machine entering system, automatic loading of plug-in, the file operation that plug-in unit is used for this machine is carried out is monitored; As newly-built, move, duplicate etc.; No matter be that client is from the downloaded vital document or with important picture document copying to USB flash disk or other memory devices, plug-in unit can both detect;
Owing to be the detection of the associative operation of file being carried out bottom; And the operation of signature and watermark must be to carry out before the file operation in system; Promptly need the operation of intercepting system; So we have used HOOK technology, the API of needs interception is tackled, and after interception, file screened and judge whether to sign and add watermark.As follows, be that HOOK mainly colludes the API that gets, and carry out replacement operation with oneself API:
Figure BDA0000139793360000101
B. plug-in unit is monitored the file operation that this machine carried out; When plug-in unit detects this machine picture file is operated, obtain digital signature; Specifically referring to Fig. 2:
B1, this machine information that reads, like MAC Address, hard disc physical sequence number and system time, with the information of this machine as the signature original text;
B2, the original text of will signing carry out hash transformation, obtain informative abstract;
B3, the current operation of utilization user's private key, and adopt the AES in the public and private key encryption and decryption system that informative abstract is encrypted, obtain digital signature;
Wherein, the main realization of digital signature is through calling the API of CSP, and roughly step is as follows:
Figure BDA0000139793360000102
Figure BDA0000139793360000111
C. judge whether this picture file has added watermark, when this picture file has added watermark, get into step e, when this picture file does not add watermark, get into step D,
D. add watermark:
The validity of signed data when signing in order to guarantee to test in the future; PKI that digital signature and current operation user's private key is corresponding and signature original text are simultaneously as watermark information; In the picture file that this machine of joining is operated; In the time of can avoiding certifying signature, occur that the user loses that key, user key are changed or expired and cause to test the label problem, return step B then;
E. watermark replacement:
Watermark extracting in the picture file that adds watermark is gone out, return step D.
After plug-in unit is intercepted the operation of user to picture file, need be with the MAC Address of this machine, information such as hard disc physical sequence number and date, utilization user current USBKey private key sign (suppose that the user needs USBKey ability entering system).
In signature process, at first a series of machine informations are carried out hash transformation, obtain informative abstract; Private key with user USBKey adopts PKI system AES to encrypt again, obtains digital signature.The validity of signing certificate when signing in order to guarantee to test, the label PKI of testing corresponding when needing to sign is together preserved, and changes the expired situation of key or key to avoid the user to lose key.
When the generation picture file leaked, the picture file method for tracing also comprised the step of testing label, is specially:
Watermark extracting in the picture file of divulging a secret that F1. will obtain goes out, and original text, digital signature and the PKI corresponding with signature private key obtain signing;
F2. the original text of will signing carries out hash transformation, obtains informative abstract; And digital signature and public signature key deciphering obtained another informative abstract;
F3, two informative abstracts that step F 2 is obtained compare, if two informative abstracts are identical, test to sign and pass through, and pass through if test to sign, the user profile and this machine information of the picture file that then obtains to divulge a secret; If two informative abstracts are inequality, test label and do not pass through; Label are obstructed out-of-date when testing, and think that watermark was modified, and the source of divulging a secret that then shows is wrong.
Basic test that to sign implementation procedure roughly following:
Figure BDA0000139793360000131
Referring to Fig. 4, the step of adding watermark can adopt as follows:
D1. watermark information pre-service; Watermark information will carry out certain pre-service earlier before embedding; Purpose is to let the form of watermark information meet the requirement that embeds algorithm; Usually watermark information is made the bianry image form; And use reversible scrambling algorithm that each pixel is carried out scramble, make the watermark that extracts can not lose readability, thereby improve the robustness of algorithm because of slight attack; Watermark information also can bit stream form embed, then to divide into groups or zero padding in this case according to the bit stream that requires of algorithm;
D2. the image of picture file is done time-frequency conversion, with image from space field transformation to frequency field;
Because the watermark that embeds in frequency field has better invisibility and stronger robustness than the watermark that directly embeds in spatial domain.Therefore should at first do time-frequency conversion, image is transformed from a spatial domain to frequency field, and the transform method that adopts is a fractional order stochastic transformation algorithm the carrier image of input; This algorithm has characteristics such as linearity, unitarity, additive property, periodicity and energy conservation; Meet the requirement of digital watermarking algorithm, simultaneously, because used key has comprised a stochastic matrix and a random series in the watermark process; Key space is bigger, therefore has higher security;
D3. image block; In frequency field; According to the size of watermark information the image array of picture file is carried out piecemeal; The image array of picture file is divided into sub-block; Wherein: n is the size of images of picture file; M is the size of watermarking images, and K is a perfect square number, (K generally gets 1,4,9); The existence of K makes the size of sub-piece less than the size of watermarking images, the big square that the K sub-block in the image of the corresponding picture file of each pixel of watermarking images is formed;
If the size of images of establishing picture file for
Figure BDA0000139793360000142
watermarking images is of a size of
Figure BDA0000139793360000143
but so the existence of K make the size of sub-piece less than the size of watermarking images, the big square that the K sub-block in the image of the corresponding picture file of each pixel of watermarking images is formed;
D4. construct random number sequence as second key, preceding r bigger number is set to 1 (wherein the value of r is identical with the size m of watermarking images) in the random number sequence, and remaining number is set to 0, obtains 01 sequence; For example; Suppose that the image size is divided into 9 identical sub-block of size for
Figure BDA0000139793360000144
watermark size then has
Figure BDA0000139793360000146
image for
Figure BDA0000139793360000145
; Structure length is the random number sequence of
Figure BDA0000139793360000147
, is example with 0 to 9 interval integer sequence:
4,7,2,0,6,7,1,3,8,
Preceding
Figure BDA0000139793360000151
individual bigger number in this sequence is made as 1 (marking with underscore):
4, 1,2,0, 11,1,3, 1
Remaining number is set to 0 (marking with an asterisk):
0 *1,0 *,0 *11,0 *,0 *1
So we have just obtained 01 required sequence.
Because the number of sub-piece is greater than the number of pixels of watermarking images; Therefore have only the parton piece to participate in the embedding of watermark; And the effect of 01 sequence is exactly to be used for indicating which sub-piece to be chosen as and to treat the embedding carrier, and in above-mentioned example, being chosen as what treat the embedding carrier is respectively the 2nd, 5,6,9 sub-block;
D5. watermark embeds
01 sequence that traversal step D4 constructs travels through every sub-block of the image of picture file synchronously, if the current element of 01 sequence is 1, then the sub-piece of correspondence is elected to be and treats the embedding carrier, embeds the watermark of a pixel; If the current element of 01 sequence is 0, then skip corresponding sub-piece, so go down, all be embedded in the image of picture file up to all watermark pixels;
The pixel of why selecting amplitude maximum in the current sub-block is as embedding point; Be because additive Gaussian noise is inversely proportional to certain vectorial interference and this vectorial amplitude; Therefore, the pixel of selecting to have big more amplitude embeds, and the watermark anti-jamming capacity will be strong more; Robustness is also just good more, can reduce watermark to greatest extent to the visual influence of former figure;
D6. time-frequency inverse transformation returns the image that is embedded with watermark to spatial domain from frequency domain transformation, makes image recover original vision content.This step need be used the inverse transformation of fractional order stochastic transformation, and this process only need can realize the opposite number that the conversion exponent number changes original exponent number into.
In specific embodiment, step D2 can adopt fractional order stochastic transformation algorithm, and carrier image is done time-frequency conversion, with the carrier image from space field transformation to frequency field; Comprise:
D21. at first construct one at random real symmetric matrix
Figure BDA0000139793360000161
wherein P be exactly stochastic matrix as first key, T is a matrix transpose operator.
D22. calculate the eigenvectors matrix of this matrix:
V wherein RiBe Ri the eigenmatrix of real symmetric matrix Q.
D23. construct following matrix of coefficients:
Figure BDA0000139793360000163
Wherein N is the height (or width) of image, and i is an imaginary unit, and α is the conversion exponent number, and M is transformation period.
D24. construct fractional order stochastic transformation matrix:
Figure BDA0000139793360000164
D25. use formula
Figure BDA0000139793360000165
Image is carried out time-frequency conversion, transform from a spatial domain to frequency and territory to image, wherein x and X RIt is respectively the image array before and after the video transformation.
Because sub-piece is in frequency field, therefore travel through its all pixels, can find out the wherein maximum pixel of amplitude, with it as treating the embedding pixel.
In specific embodiment, step D5 can carry out watermark according to following formula and embed:
Figure BDA0000139793360000166
Wherein φ is the current phase value of treating the embedding pixel;
Figure BDA0000139793360000167
is the phase value behind the embed watermark, and θ is an insert depth.
θ is big more, and the watermark of embedding is firm more, and robustness is good more; Accuracy during extraction is also just high more; But therefore the visuality of image should be selected in the value of θ certain suitable scope after excessive θ can influence and embed, and the value that generally can select θ is between 0.2 to 0.5.
Referring to Fig. 5, in specific embodiment, watermark extracting can adopt following steps to accomplish:
E1. to the image of water mark inlaying and not the original image of water mark inlaying do time-frequency conversion respectively, image is transformed from a spatial domain to frequency field;
E2. in frequency field respectively to the image array of water mark inlaying and not the original image matrix of water mark inlaying carry out piecemeal; Be specially: in frequency field; According to the size of watermark information the image array of picture file is carried out piecemeal; The image array of picture file is divided into
Figure BDA0000139793360000171
sub-block; Wherein: n is the size of images of picture file, and m is the size of watermarking images, and K is a perfect square number;
E3. construct random number sequence as second key, preceding r bigger number is set to 1 (wherein the value of r is identical with the size m of watermarking images) in the random number sequence, and remaining number is set to 0, obtains 01 sequence;
E4. extract watermark
Travel through all the sub-pieces and 01 sequence of the image of water mark inlaying synchronously, select the sub-piece of the image of the pairing water mark inlaying of 1 value element in 01 sequence; Simultaneously, travel through not all the sub-pieces and 01 sequence of the original image of water mark inlaying synchronously, select the sub-piece of the original image of the pairing not water mark inlaying of 1 value element in 01 sequence; For the selected sub-piece of the image of water mark inlaying and the selected sub-piece of the original image of water mark inlaying not, travel through its all pixels respectively, select the maximum pixel of amplitude wherein as extracting object, and the watermark pixel value current according to following Rule Extraction:
Figure BDA0000139793360000172
M wherein jBe j the watermark pixel value that extracts, μ is the phase value of the current vegetarian refreshments of original image of not water mark inlaying, and λ is the phase value of the image current pixel point of embed watermark, and θ is an insert depth, and T is an adjustable threshold; Can through to T the intensity of regulating watermark extracting specifically is set, T is big more, the more difficult extraction of watermark, but accuracy is also high more;
E5. watermark information aftertreatment
For the watermark that extracts, handle according to the pretreated inverse approach of watermark information.
When in step D1, when pre-service, adopt watermark information is made the bianry image form, and when using reversible scrambling algorithm that each pixel is carried out scramble, then use the algorithm for inversion of scrambling algorithm that each pixel of bianry image of extracting is carried out inverted disorderly; When in pre-service, adopt when watermark information embedded with the form of bit stream; Then to convert the two-dimentional watermark that extracts to one-dimensional sequence; Reject 0 value of filling up in advance according to the rule of the zero padding in the preprocessing process then; Could recover the vision content of watermarking images like this, thereby obtain final watermarking information.
Picture file is followed the trail of and is mainly used in enterprise network inside, at all user sides of intranet the monitoring plug-in unit has been installed, and the picture file in the in-house network has been carried out signature and watermark operation.After secret file leakage accident takes place, can detect the source of leaks of enterprises.
The file layout of the watermark carrier that system adopted is main with picture and PDF document, considers stronger invisibility and robustness, adopts the strong watermarking algorithm in the transform domain that the relevant information of signing is embedded.
Transform domain embeds and to be meant before embed watermark, uses certain time-frequency conversion method earlier, with carrier from space field transformation to frequency field, embed watermark in frequency field then, spatial domain is returned in the carrier conversion that utilizes inverse transform method will be embedded with watermark more at last.This method has better invisibility and stronger robustness than direct method at the spatial domain embed watermark.The digital watermarking field that is applied to that present many kinds of transform methods are ripe, for example cosine transform, wavelet transformation; Fourier transform or the like; Native system will adopt a kind of improved fractional order stochastic transformation as mapping algorithm, characteristics such as the linearity that this conversion has, unitarity, additive property, periodicity and energy conservation, and used key has comprised a random series and a stochastic matrix; Key space is bigger, has higher security.
Strong watermark is meant can resist the watermarking algorithm of necessarily distorting attack, and weak watermark on the other side then is meant for attacking responsive watermarking algorithm.Two kinds of watermarking algorithms are suitable for the different demands environment, strong watermark can resist that outer bound pair carrier carried out unintentionally or the modification of malice, comprise compression, cutting, add make an uproar, rotation etc., weak watermark then is suitable for distorting application such as detection.The function of considering system is to come the trace files source of leaks according to the watermark information that embeds hereof; When transmitting on the internet after in case file is revealed; Guarantee that watermark information can be because of not distorting and lose in the transmission course, therefore, strong watermarking algorithm more is suitable for and native system.

Claims (6)

1. picture file method for tracing, it is characterized in that: said method comprises the steps:
A., plug-in unit is installed in computing machine;
B. plug-in unit is monitored the file operation that this machine carried out; When plug-in unit detects this machine picture file is operated, obtain digital signature; Be specially:
B1, read the information of this machine, with the information of this machine as the signature original text;
B2, the original text of will signing carry out hash transformation, obtain informative abstract;
B3, the current operation of utilization user's private key, and adopt the AES in the public and private key encryption and decryption system that informative abstract is encrypted, obtain digital signature;
C. judge whether this picture file has added watermark, when this picture file has added watermark, get into step e, when this picture file does not add watermark, get into step D,
D. add watermark:
PKI that digital signature and current operation user's private key is corresponding and signature original text be simultaneously as watermark information, joins in the picture file that this machine operates, and returns step B;
E. watermark replacement:
Watermark extracting in the picture file that adds watermark is gone out, return step D.
2. picture file method for tracing according to claim 1 is characterized in that: when the generation picture file leaks, also comprise the steps:
Watermark extracting in the picture file of divulging a secret that F1. will obtain goes out, and original text, digital signature and the PKI corresponding with signature private key obtain signing;
F2. the original text of will signing carries out hash transformation, obtains informative abstract; And digital signature and public signature key deciphering obtained another informative abstract;
F3, two informative abstracts that step F 2 is obtained compare, if two informative abstracts are identical, test to sign and pass through, and pass through if test to sign, the user profile and this machine information of the picture file that then obtains to divulge a secret; If two informative abstracts are inequality, test label and do not pass through; Label are obstructed out-of-date when testing, and think that watermark was modified, and the source of divulging a secret that then shows is wrong.
3. picture file method for tracing according to claim 1 and 2, it is characterized in that: step D comprises:
D1. watermark information pre-service;
D2. the image of picture file is done time-frequency conversion, with image from space field transformation to frequency field;
D3. image block: in frequency field; According to the size of watermark information the image array of picture file is carried out piecemeal, the image array of picture file is divided into the b=Kn/m sub-block, wherein: n is the size of images of picture file; M is the size of watermarking images, and K is a perfect square number;
D4. construct random number sequence as second key, preceding r bigger number is set to 1 (wherein r value and watermarking images is measure-alike) in the random number sequence, and remaining number is set to 0, obtains 01 sequence;
D5. watermark embeds
01 sequence that traversal step D4 constructs travels through every sub-block of the image of picture file synchronously, if the current element of 01 sequence is 1, then pairing sub-piece is elected to be and treats the embedding carrier, embeds the watermark of a pixel; If the current element of 01 sequence is 0, then skip pairing sub-piece, so go down, all be embedded in the image of picture file up to all watermark pixels;
D6. time-frequency inverse transformation returns the image that is embedded with watermark to spatial domain from frequency domain transformation.
4. picture file method for tracing according to claim 3 is characterized in that: step D2 is specially and adopts fractional order stochastic transformation algorithm, and the image of picture file is done time-frequency conversion, with image from space field transformation to frequency field; Comprise:
D21. at first construct one at random real symmetric matrix
Figure FDA0000139793350000021
wherein P be stochastic matrix as first key, T is a matrix transpose operator;
D22. calculate the eigenvectors matrix of real symmetric matrix:
V R=[V R1,V R2,·,V RN],
V wherein RiBe the R of real symmetric matrix Q iIndividual eigenmatrix;
D23. construct matrix of coefficients:
D α R = diag [ 1 , exp ( - i 2 πα M ) , · , exp ( - i 2 ( N - 1 ) πα M ) ] ,
Wherein N is the height or the width of image, and i is an imaginary unit, and α is the conversion exponent number, and M is transformation period;
D24. construct fractional order stochastic transformation matrix:
R α = V R D α R V R T
D25. use formula X R=R αX (R α) TImage is carried out time-frequency conversion, transform from a spatial domain to frequency field to image, wherein x and X RIt is respectively the image array before and after the video transformation.
5. picture file method for tracing according to claim 4 is characterized in that: step D5 embeds for carry out watermark according to following formula:
Figure FDA0000139793350000033
Wherein φ is the current phase value of treating the embedding pixel;
Figure FDA0000139793350000034
is the phase value behind the embed watermark, and θ is an insert depth.
6. picture file method for tracing according to claim 5, it is characterized in that: watermark extracting comprises the steps:
E1. to the image of the picture file of water mark inlaying and not the original image of water mark inlaying do time-frequency conversion respectively, image is transformed from a spatial domain to frequency field;
E2. in frequency field respectively to the image array of water mark inlaying and not the original image matrix of water mark inlaying carry out piecemeal; Be specially: in frequency field; According to the size of watermark information the image array of picture file is carried out piecemeal, the image array of picture file is divided into the b=Kn/m sub-block, wherein: n is the size of images of picture file; M is the size of watermarking images, and K is a perfect square number;
E3. construct random number sequence as second key, preceding r bigger number is set to 1 (wherein r value and watermarking images is measure-alike) in the random number sequence, and remaining number is set to 0, obtains 01 sequence;
E4. extract watermark
Travel through all the sub-pieces and 01 sequence of the image of water mark inlaying synchronously, select the sub-piece of the image of the pairing water mark inlaying of 1 value element in 01 sequence; Simultaneously, travel through not all the sub-pieces and 01 sequence of the original image of water mark inlaying synchronously, select the sub-piece of the original image of the pairing not water mark inlaying of 1 value element in 01 sequence; For the selected sub-piece of the image of water mark inlaying and the selected sub-piece of the original image of water mark inlaying not, travel through its all pixels respectively, select the maximum pixel of amplitude wherein as extracting object, and the watermark pixel value current according to following Rule Extraction:
M wherein jBe j the watermark pixel value that extracts, μ is the phase value of the current vegetarian refreshments of original image of not water mark inlaying, and λ is the phase value of the image current pixel point of embed watermark, and θ is an insert depth, and T is an adjustable threshold;
E5. watermark information aftertreatment
For the watermark that extracts, handle according to the pretreated inverse approach of watermark information.
CN201210050514.9A 2012-03-01 2012-03-01 Picture file tracking method Active CN102622545B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210050514.9A CN102622545B (en) 2012-03-01 2012-03-01 Picture file tracking method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210050514.9A CN102622545B (en) 2012-03-01 2012-03-01 Picture file tracking method

Publications (2)

Publication Number Publication Date
CN102622545A true CN102622545A (en) 2012-08-01
CN102622545B CN102622545B (en) 2015-01-14

Family

ID=46562460

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210050514.9A Active CN102622545B (en) 2012-03-01 2012-03-01 Picture file tracking method

Country Status (1)

Country Link
CN (1) CN102622545B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103440461A (en) * 2013-09-16 2013-12-11 山东省计算中心 PDF (Portable Document Format) document security auditing method
CN104680472A (en) * 2014-08-02 2015-06-03 兰州交通大学 Space domain and frequency domain combined vector spatial data multi-blind watermarking method
CN106228075A (en) * 2016-07-18 2016-12-14 刘日初 A kind of document handling method and device
CN106228083A (en) * 2016-07-18 2016-12-14 刘日初 A kind of document handling method, device, server and terminal
CN107395361A (en) * 2017-07-25 2017-11-24 成都国科微电子有限公司 The conversion of information source data and authentication method and system
CN108537053A (en) * 2017-12-29 2018-09-14 晋城市大锐金马商务信息咨询有限公司 A kind of delay watermark adding technique based on document
CN109145632A (en) * 2017-06-28 2019-01-04 北京京东尚科信息技术有限公司 For generating the method and device of traceable file
CN109284614A (en) * 2018-08-10 2019-01-29 五八有限公司 Information Authentication method, apparatus, computer equipment and computer readable storage medium
CN109657426A (en) * 2019-01-30 2019-04-19 贵州大学 A kind of data source tracing method based on digital signature and digital watermarking
CN111131654A (en) * 2018-10-30 2020-05-08 浙江宇视科技有限公司 Watermark embedding method and device and coder-decoder
CN112528247A (en) * 2020-12-03 2021-03-19 四川新网银行股份有限公司 High-efficiency high-safety report distribution method and device for banking industry
CN115828195A (en) * 2023-02-09 2023-03-21 支付宝(杭州)信息技术有限公司 Watermark embedding method and device, storage medium and electronic equipment
CN117093965A (en) * 2023-10-20 2023-11-21 江苏省测绘资料档案馆 Full-flow tracking system and method for basic surveying and mapping result

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI815779B (en) * 2023-03-17 2023-09-11 英業達股份有限公司 System for verifying edited image

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101847249A (en) * 2009-03-27 2010-09-29 上海德通能源环保科技有限公司 Method for implementing image digital watermark
CN101980240A (en) * 2010-11-19 2011-02-23 北京巨网汇通信息技术有限公司 Method and equipment for preventing data from being stolen

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101847249A (en) * 2009-03-27 2010-09-29 上海德通能源环保科技有限公司 Method for implementing image digital watermark
CN101980240A (en) * 2010-11-19 2011-02-23 北京巨网汇通信息技术有限公司 Method and equipment for preventing data from being stolen

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
余永升等: "一个用于涉密图像泄密检测与追踪的***原型", 《华中科技大学学报(自然科学版)》 *

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103440461A (en) * 2013-09-16 2013-12-11 山东省计算中心 PDF (Portable Document Format) document security auditing method
CN103440461B (en) * 2013-09-16 2016-07-06 山东省计算中心 A kind of PDF document security auditing method
CN104680472A (en) * 2014-08-02 2015-06-03 兰州交通大学 Space domain and frequency domain combined vector spatial data multi-blind watermarking method
CN104680472B (en) * 2014-08-02 2017-09-29 兰州交通大学 The multiple blind watermark method of Vector spatial data that spatial domain and frequency domain are combined
CN106228075A (en) * 2016-07-18 2016-12-14 刘日初 A kind of document handling method and device
CN106228083A (en) * 2016-07-18 2016-12-14 刘日初 A kind of document handling method, device, server and terminal
CN109145632A (en) * 2017-06-28 2019-01-04 北京京东尚科信息技术有限公司 For generating the method and device of traceable file
CN107395361A (en) * 2017-07-25 2017-11-24 成都国科微电子有限公司 The conversion of information source data and authentication method and system
CN108537053A (en) * 2017-12-29 2018-09-14 晋城市大锐金马商务信息咨询有限公司 A kind of delay watermark adding technique based on document
CN109284614A (en) * 2018-08-10 2019-01-29 五八有限公司 Information Authentication method, apparatus, computer equipment and computer readable storage medium
CN111131654A (en) * 2018-10-30 2020-05-08 浙江宇视科技有限公司 Watermark embedding method and device and coder-decoder
CN111131654B (en) * 2018-10-30 2022-07-19 浙江宇视科技有限公司 Watermark embedding method and device and coder-decoder
CN109657426A (en) * 2019-01-30 2019-04-19 贵州大学 A kind of data source tracing method based on digital signature and digital watermarking
CN109657426B (en) * 2019-01-30 2023-08-15 贵州大学 Data tracing method based on digital signature and digital watermark
CN112528247A (en) * 2020-12-03 2021-03-19 四川新网银行股份有限公司 High-efficiency high-safety report distribution method and device for banking industry
CN115828195A (en) * 2023-02-09 2023-03-21 支付宝(杭州)信息技术有限公司 Watermark embedding method and device, storage medium and electronic equipment
CN117093965A (en) * 2023-10-20 2023-11-21 江苏省测绘资料档案馆 Full-flow tracking system and method for basic surveying and mapping result
CN117093965B (en) * 2023-10-20 2024-03-12 江苏省测绘资料档案馆 Full-flow tracking system and method for basic surveying and mapping result

Also Published As

Publication number Publication date
CN102622545B (en) 2015-01-14

Similar Documents

Publication Publication Date Title
CN102622545B (en) Picture file tracking method
CN108881230B (en) Secure transmission method and device for government affair big data
Kumar et al. Known-plaintext attack-free double random phase-amplitude optical encryption: vulnerability to impulse function attack
Chaduvula et al. Security in cyber-enabled design and manufacturing: A survey
Bhatt et al. Image steganography and visible watermarking using LSB extraction technique
Loukhaoukha Image watermarking algorithm based on multiobjective ant colony optimization and singular value decomposition in wavelet domain
CN103700059B (en) The cloud storage view data property held method of proof based on multifunction digital watermark
Abdullah et al. Secure data transfer over internet using image steganography
Wu et al. Logistic map and contourlet-based robust zero watermark for medical images
Xun et al. Dual anti-counterfeiting of QR code based on information encryption and digital watermarking
Chow et al. Utilizing QR codes to verify the visual fidelity of image datasets for machine learning
Nassar et al. Confidentiality considerations: multimedia signals transmission over different wireless channels utilized efficient secured model
Liu et al. Target-based image encryption via infinite interval chaotic system with Ill-conditioned parameter and 3DBDM
Gu et al. Research on information hiding technology
Das et al. Digital forensic enabled image authentication using least significant bit (lsb) with tamper localization based hash function
Riaz et al. Image authentication and restoration by multiple watermarking techniques with advance encryption standard in digital photography
Nassar et al. Reliable mark-embedded algorithm for verifying archived/encrypted image contents in presence different attacks with FEC utilizing consideration
Bhattacharya Survey on Digital Watermarking–A Digital Forensics & Security Application
Singh et al. A recent survey of DCT based digital image watermarking theories and techniques: a review
Shukla et al. A recent survey on information-hiding techniques
Li et al. A reversible and lossless secret image sharing scheme with authentication for color images
Khan et al. Increased PSNR with improved DWT digital watermarking technique
Liu et al. Secure optical verification using dual phase-only correlation
Arabzadeh et al. Detection, Reconstruction, and Repairing the Distortion in the Quran Pages Based on Watermarking
Agarwal et al. A Brief Review on Various Aspects of Steganography Followed by Cryptographic Analysis

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant