CN111050021A - Image privacy protection method based on two-dimensional code and reversible visual watermark - Google Patents

Image privacy protection method based on two-dimensional code and reversible visual watermark Download PDF

Info

Publication number
CN111050021A
CN111050021A CN201911301386.9A CN201911301386A CN111050021A CN 111050021 A CN111050021 A CN 111050021A CN 201911301386 A CN201911301386 A CN 201911301386A CN 111050021 A CN111050021 A CN 111050021A
Authority
CN
China
Prior art keywords
image
watermark
dimensional code
embedding
secret
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911301386.9A
Other languages
Chinese (zh)
Inventor
王�锋
俞能海
姚远志
周赛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Science and Technology of China USTC
Original Assignee
University of Science and Technology of China USTC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Science and Technology of China USTC filed Critical University of Science and Technology of China USTC
Priority to CN201911301386.9A priority Critical patent/CN111050021A/en
Publication of CN111050021A publication Critical patent/CN111050021A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses an image privacy protection method based on a two-dimensional code and a reversible visual watermark, which comprises the following steps: carrying out privacy information removal processing on the original image to generate an image without privacy information and privacy information, and carrying out encryption processing on the privacy information; generating a uniform resource locator which can be linked to encrypted private information, encoding the uniform resource locator into a two-dimensional code, and then embedding reversible visual watermarks into the image without the private information to obtain a secret-carrying image; for an authorized image receiver, the embedded two-dimensional code can be extracted from the secret-carrying image, encrypted privacy information is further obtained, the privacy information is obtained through decryption, and the privacy information is fused to obtain an original image. The method can effectively realize the access authority control of the privacy information and avoid privacy disclosure.

Description

Image privacy protection method based on two-dimensional code and reversible visual watermark
Technical Field
The invention relates to the technical field of reversible information hiding, in particular to an image privacy protection method based on two-dimensional codes and reversible visual watermarks.
Background
With the increasingly sophisticated shooting function of the mobile intelligent terminal and the rapid development of the mobile internet, the cost for acquiring digital images and publishing the digital images on the network becomes lower. The user can obtain better user experience by publishing and sharing the digital image shot by the user in the internet. However, with such communication activities, the user's personal private information is also exposed to the risk of leakage. When a mobile communication application (such as WeChat and QQ) issues an image, many users choose to upload artwork to obtain a better visual quality experience. The uploaded original image often has privacy information such as shooting time, shooting location and detailed description, and a service provider with powerful computing power can portray the user according to big data analysis technology.
Therefore, the communication behavior of publishing images using social networks and mobile communication applications is accompanied by a problem of leakage of private information; however, there is currently no more efficient solution.
Disclosure of Invention
The invention aims to provide an image privacy protection method based on a two-dimensional code and a reversible visual watermark, which can effectively realize access authority control on privacy information and avoid privacy disclosure.
The purpose of the invention is realized by the following technical scheme:
an image privacy protection method based on two-dimensional codes and reversible visual watermarks comprises the following steps:
carrying out privacy information removal processing on the original image to generate an image without privacy information and privacy information, and carrying out encryption processing on the privacy information;
generating a uniform resource locator which can be linked to encrypted private information, encoding the uniform resource locator into a two-dimensional code, and then embedding reversible visual watermarks into the image without the private information to obtain a secret-carrying image;
for an authorized image receiver, the embedded two-dimensional code can be extracted from the secret-carrying image, encrypted privacy information is further obtained, the privacy information is obtained through decryption, and the privacy information is fused to obtain an original image.
According to the technical scheme provided by the invention, the original image is subjected to privacy information removal processing, the privacy information is processed into the corresponding two-dimensional code, and the two-dimensional code is embedded into the image without the privacy information in a reversible visual watermark mode, so that only authorized users can obtain the privacy information and obtain the original image, the access right control of the privacy information is realized, and the privacy disclosure is avoided.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a flowchart of an image privacy protection method based on a two-dimensional code and a reversible visual watermark according to an embodiment of the present invention;
fig. 2 is a flowchart of an image reversible visual watermark embedding method for a two-dimensional code according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a two-dimensional code division area according to an embodiment of the present invention;
fig. 4 is a two-dimensional code image used as a watermark in an experiment provided by an embodiment of the present invention;
FIG. 5 is an image of a support used in an experiment provided by an embodiment of the present invention;
fig. 6 is a secret-carrying image generated by using a reversible visual watermarking algorithm on a carrier image Lena according to an embodiment of the present invention;
FIG. 7 is a secret-carrying image generated by Peppers using a reversible visual watermarking algorithm on a carrier image according to an embodiment of the present invention;
FIG. 8 is a graph showing the robustness of the Lena secret-carrying image against JPEG image compression attack according to the embodiment of the present invention;
fig. 9 shows the robustness of the cryptographic image Peppers against JPEG image compression attacks according to the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention provides an image privacy protection method based on a two-dimensional code and a reversible visual watermark, which is used for solving the privacy disclosure problem when a user publishes an image by using a mobile communication application program, and as shown in fig. 1, the image privacy protection method mainly comprises the following steps:
step 1, carrying out privacy information removal processing on an original image, generating an image without privacy information and privacy information, and carrying out encryption processing on the privacy information.
Illustratively, this step may be performed by the image sender, which is typically the acquirer for the original image.
The main process of the step is as follows:
and 11, extracting the privacy information of the original image to generate an image without the privacy information and the privacy information.
Illustratively, the privacy information includes one or more of the following: including the shooting time, shooting place and detailed description; the detailed description comprises the labeling information of the original image acquirer to the image.
And step 12, encrypting the private information by using the encryption key.
And step 13, sending the image without the privacy information and the encrypted privacy information to the outside.
And 2, generating a uniform resource locator which can be linked to the encrypted private information, encoding the uniform resource locator into a two-dimensional code, and then embedding a reversible visual watermark into the image without the private information to obtain a secret-carrying image.
Illustratively, this step may be performed by the cloud platform, that is, the cloud platform is a receiver of the related information in step 13.
The main process of the step is as follows:
and step 21, the cloud platform manages the received encrypted privacy information in the storage server.
Step 22, generating a uniform resource locator that can be linked to the encrypted private information.
And step 23, encoding the uniform resource locator into a two-dimensional code, and reversibly embedding the two-dimensional code into the privacy information removal image as a visual watermark according to the watermark key to obtain the secret-carrying image.
In order to balance the visibility of the watermark and the visual quality of the secret-carrying image, in the embodiment of the invention, a visual perception model is used for selecting proper watermark embedding parameters; a preferred embodiment is given below:
let x and w be the carrier image (grey-scale carrier image) and watermark image (binary watermark image) pixel values expressed by 8 bits, respectively, the visual watermark embedding model is expressed as:
y=(1-α')x+αw
where y is the value of the pixel of the secret image in which the visual watermark is embedded, and α' e [0,1] is the watermark embedding parameter that controls the strength of the watermark embedding.
In the embodiment of the invention, the carrier image is an image without privacy information, and the watermark image is a two-dimensional code.
The step of reversibly embedding the visible watermark into the carrier image is shown in fig. 2 and mainly comprises:
1) and determining the two-dimensional code partition.
As shown in FIG. 3, the two-dimensional code is divided into blank areas IBPosition detection area IDAnd other regions IRFor three different regions, different watermark embedding parameters are selected.
2) For blank area IBSince the identification of the two-dimensional code is not influenced, in order to ensure the visual quality of the secret-carrying image, the watermark embedding parameter α is directly selectedBWhen the carrier image pixel value of the blank area is equal to 0, the carrier image pixel value of the blank area is equal to:
yp,q=xp,q
wherein (p, q) represents that the carrier image and the secret image correspond to the blank area IBX and y each represent a carrier image pixel value and a secret image pixel value at the corresponding position point.
3) For the position detection area IDAnd other regions IRModeling visible watermark embedding as a problem of minimum embedding distortion of embedding parameters in a visible range of the watermark; wherein for the position detection zone IDThe two-dimensional code pixel value range to be considered is wi,jE {0,255 }; for other regions IRSince the white pixels are not used for bearing the two-dimensional code coding information and the error correction information, only for the case that the two-dimensional code pixels are black, i.e. wi,j0. The embedding distortion under these two regions is expressed as:
Figure BDA0002321884350000041
wherein (I, j) indicates that the carrier image and the secret image correspond to the position detection region IDAnd other regions IRWhere ρ represents the embedding distortion, x and y each represent the carrier image pixel value and the secret image pixel value at the corresponding location point, and α represents the watermark embedding parameter at the corresponding location point.
In the embodiment of the invention, a visual perception model is adopted to evaluate the visibility of the watermark, a JND (just noticeable difference) model and a threshold T of the minimum noticeable difference of a carrier image pixel x are calledJND(x) Expressed as:
TJND(x)=LA(x)+MS(x)-γ·min{LA(x),MS(x)}
where γ is a parameter of the model, LA(x) Is a luminance adaptive visibility threshold, MS(x) Is a spatial mask function;
when the two-dimensional code watermark is embedded, the value of the carrier image pixel x changes, and when the change amplitude is at the minimum perceptible difference threshold TJND(x) When within range, the human visual system cannot perceive and storesAt minimum watermark embedding strength αminMaking the embedded watermark visible, location detection zone IDAnd other regions IRThe watermark embedding parameter range of (a) is expressed as:
α∈[αmin,1]
according to the visual perception model, in order to make the embedded watermark be perceived by human eyes, the difference value of image pixels before and after embedding the watermark is required to exceed the minimum perceptible difference threshold TJND(x) The optimization goal is to make the embedding distortion as small as possible on the premise of ensuring that the difference is large enough. Therefore, the problem of minimized embedding distortion of watermark embedding parameters in the visible range is expressed as:
minimizeρi,j(xi,j,yi,j)
subject to|yi,j-xi,j|≥TJND(xi,j)
yi,j=(1-αi,j)xi,ji,jwi,j
4) in order to recover the original carrier image after extracting the embedded two-dimensional code, the pixel difference values of the carrier image and the secret image form a reconstruction data packet P, which is expressed as:
P={δm,nm,n=ym,n-xm,n}
wherein (m, n) represents the position points in the entire carrier image and the secret image;
and compressing the reconstruction data packet P by adopting a JBIG compression algorithm, and embedding the compressed reconstruction data packet by using a traditional reversible information algorithm.
And 3, for an authorized image receiver, extracting the embedded two-dimensional code from the secret-carrying image to obtain encrypted privacy information, decrypting to obtain the privacy information, and fusing the privacy information to obtain the original image.
The main process of the step is as follows:
and 31, extracting the two-dimensional code in the encrypted image according to the watermark key.
And step 32, inquiring the encrypted private information from a storage server of the cloud platform according to the uniform resource locator obtained by decoding the two-dimensional code.
And step 33, obtaining the decrypted private information by using the encryption key, meanwhile, embedding a pixel difference value between the secret-carrying image and the carrier image into the secret-carrying image to form a reconstructed data packet, extracting the reconstructed data packet, restoring an image (namely the carrier image) with the private information removed by combining the secret-carrying image, and fusing the private information to obtain an original image.
In the embodiment of the invention, even if an unauthorized user obtains the secret image embedded with the two-dimensional code, the unauthorized user cannot obtain the privacy information associated with the image.
In order to verify the effectiveness of the image privacy protection method based on the two-dimensional code and the reversible visual watermark, the performance test is carried out on the reversible visual watermark method of the image aiming at the two-dimensional code, and the safety of the scheme is evaluated.
The image reversible visual watermarking algorithm aiming at the two-dimensional code is realized in MATLAB R2016a, and a reversible hiding algorithm designed for the QR code by Huang and the like, a block truncation coding watermarking algorithm proposed by Mohammad and the like and a reversible visual watermarking algorithm based on the encrypted image proposed by Yao and the like are selected for comparison. In the experiment, the encoding information of the two-dimensional code watermark is "university of Science and Technology of China", and the sizes of the left and right two-dimensional codes are 128 × 128 and 256 × 256, respectively, as shown in fig. 4. Six pictures in a standard test image library are selected as test images, as shown in fig. 5, the names of the images are Jetplane, Lena, Living room, Mandril, Peppers and Woman in sequence, and the peak signal-to-noise ratio PSNR and the structural similarity SSIM are used for evaluating the visual quality of the dense images.
To test the visibility of the watermark, a reversible visual watermarking algorithm was used for the carrier images Lena, Peppers, respectively, and the results are shown in fig. 6 and 7. In fig. 6 and 7, (a) is the result of Huang et al, (b) is the result of Mohammad et al, (c) is the result of Yao et al, and (d) is the result of the present invention. As can be seen from fig. 6 and 7, after the watermark is embedded in the carrier image by using the image reversible visual watermarking algorithm proposed by Mohammad et al and Yao et al, the embedded two-dimensional code cannot be identified. In a secret image generated using the image reversible visual watermark proposed by Huang et al, the embedded two-dimensional code, although correctly recognizable, completely masks the image content of the watermark embedding area. The algorithm provided by the invention aims to solve the problem of balanced analysis between the visibility of the watermark and the visual quality of the secret-carrying image, the embedded two-dimensional code can be correctly identified, the image content of the watermark embedding area can not be completely covered, the visibility of the watermark and the visual quality of the secret-carrying image can be better considered, and necessary precondition is provided for authorized users to obtain private information.
In order to objectively evaluate the visual quality of the secret-carrying images, reversible visual watermarks having two-dimensional code sizes of 128 × 128 and 256 × 256 were embedded in six pieces of the secret-carrying images, respectively, and the objective quality of the generated secret-carrying images is shown in tables 1 and 2. The bold numbers indicate that the best quality of the encrypted image can be achieved by the corresponding image reversible visual watermarking algorithm. The image reversible visual watermarking algorithm provided by the invention can obtain the best visual quality of the secret-carrying image under most conditions.
Figure BDA0002321884350000061
Table 1 objective quality of generating a secret image using different reversible visual watermarking algorithms when the carrier image is Lena and the size of the two-dimensional code is 128 × 128
Figure BDA0002321884350000062
TABLE 2 Objective quality of generating a secret image using different reversible visual watermarking algorithms when the carrier image is Peppers and the size of the two-dimensional code is 256 × 256
The security of the image privacy protection scheme includes encryption security and visual watermark security.
According to the invention, a data security circulation channel among the image sender, the cloud platform and the image receiver is constructed, and the risk of privacy disclosure is effectively reduced. For an image sender, the original image needs to be subjected to privacy information removal processing, and privacy information is encrypted according to an encryption key, so that privacy leakage in the communication process with the cloud platform is reduced. For the cloud platform, the private information is in an encrypted state, and the cloud platform cannot obtain decrypted private information without an encryption key. Even if a secret image embedded in a two-dimensional code is obtained, an unauthorized user cannot obtain private information associated with the image because of the absence of a correct encryption key.
The robustness of the watermark is a very beneficial property. Based on the scheme of the embodiment of the invention, the robustness test for resisting JPEG image compression attack is carried out.
Fig. 8 depicts the robustness of the generated secret image against the JPEG image compression attack characteristic when the carrier image is Lena and the size of the embedded two-dimensional code is 128 × 128, and qf (quality factor) is the quality factor of JPEG compression. Wherein, (a) QF is 85, PSNR is 27.589dB, and the two-dimensional code size is 128 × 128, which is identifiable; (b) QF 65, PSNR 27.376dB, two-dimensional code size 128 × 128, identifiable; (c) QF 45, PSNR 27.213dB, two-dimensional size 128 × 128, identifiable; (d) QF 25, PSNR 26.967dB, two-dimensional code size 128 × 128, recognizable.
Fig. 9 depicts the robustness of the generated secret image against the JPEG image compression attack characteristic when the carrier image is Peppers and the size of the embedded two-dimensional code is 256 × 256. Wherein, (a) QF is 85, PSNR is 20.914dB, and the two-dimensional code size is 256 × 256, which is identifiable; (b) QF 65, PSNR 20.858dB, two-dimensional size 256 × 256, and can be identified; (c) QF is 45, PSNR is 20.832dB, and the two-dimensional code size is 256 × 256, which is recognizable; (d) QF 25, PSNR 20.819dB, and a two-dimensional code size of 256 × 256, which is recognizable.
Experiments show that the image privacy protection scheme provided by the invention has robustness against JPEG image compression and can still play a role in a certain malicious attack environment.
Through the above description of the embodiments, it is clear to those skilled in the art that the above embodiments can be implemented by software, and can also be implemented by software plus a necessary general hardware platform. With this understanding, the technical solutions of the embodiments can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.), and includes several instructions for enabling a computer device (which can be a personal computer, a server, or a network device, etc.) to execute the methods according to the embodiments of the present invention.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (7)

1. An image privacy protection method based on two-dimensional codes and reversible visual watermarks is characterized by comprising the following steps:
carrying out privacy information removal processing on the original image to generate an image without privacy information and privacy information, and carrying out encryption processing on the privacy information;
generating a uniform resource locator which can be linked to encrypted private information, encoding the uniform resource locator into a two-dimensional code, and then embedding reversible visual watermarks into the image without the private information to obtain a secret-carrying image;
for an authorized image receiver, the embedded two-dimensional code can be extracted from the secret-carrying image, encrypted privacy information is further obtained, the privacy information is obtained through decryption, and the privacy information is fused to obtain an original image.
2. The image privacy protection method based on the two-dimensional code and the reversible visual watermark, according to claim 1, wherein the privacy information includes one or more of the following information: including the shooting time, shooting place and detailed description;
the detailed description comprises the labeling information of the original image acquirer to the image.
3. The image privacy protection method based on the two-dimensional code and the reversible visual watermark is characterized in that after the uniform resource locator which can be linked to the encrypted private information is generated and encoded into the two-dimensional code, the reversible visual watermark embedding is carried out on the image without the private information, and an execution main body for obtaining the secret-carrying image comprises a cloud platform;
the cloud platform stores the encrypted privacy information in the storage server and then generates a uniform resource locator which can be linked to the encrypted privacy information.
4. The image privacy protection method based on the two-dimensional code and the reversible visual watermark as claimed in claim 1, wherein an authorized image receiver extracts the embedded two-dimensional code and then decodes the embedded two-dimensional code to obtain the uniform resource locator, thereby obtaining the encrypted privacy information.
5. The image privacy protection method based on the two-dimensional code and the reversible visual watermark, as claimed in claim 1,
let x and w be the pixel values of the carrier image and the watermark image expressed by 8 bits, respectively, the visual watermark embedding model is expressed as:
y=(1-α')x+αw
wherein y is a pixel value of a secret-carrying image embedded with the visual watermark, and α' belongs to [0,1] is a watermark embedding parameter for controlling the embedding strength of the watermark;
the carrier image is an image without privacy information, and the watermark image is a two-dimensional code.
6. The image privacy protection method based on the two-dimensional code and the reversible visual watermark, as claimed in claim 1 or 5, wherein the reversible visual watermark embedding step includes:
determining the partition of the two-dimensional code, wherein the two-dimensional code is divided into blank areas IBPosition detection area IDAnd other regions IRFor three different regions, different water is selectedPrinting embedding parameters;
for blank area IBSelecting the watermark embedding parameters αBThe dense pixel value of the blank area is equal to the carrier pixel value:
yp,q=xp,q
wherein (p, q) represents that the carrier image and the secret image correspond to the blank area IBX and y respectively represent the pixel value of the carrier image and the pixel value of the secret-carrying image at the corresponding position points; the carrier image is an image without privacy information;
for the position detection area IDAnd other regions IRModeling visible watermark embedding as a problem of minimum embedding distortion of embedding parameters in a visible range of the watermark; wherein for the position detection zone IDThe pixel range of the two-dimensional code is wi,jE {0,255 }; for other regions IRFor the case where the two-dimensional code pixel is black, i.e. wi,jThe embedding distortion under these two regions is expressed as 0:
Figure FDA0002321884340000021
wherein (I, j) indicates that the carrier image and the secret image correspond to the position detection region IDAnd other regions IRP represents embedding distortion, x and y each represent a carrier image pixel value and a secret image pixel value at the corresponding position point, and α represents watermark embedding parameters of the corresponding position point;
evaluating the visibility of the watermark by adopting a visual perception model, calling a minimum perceptible difference model and a minimum perceptible difference threshold T of a carrier image pixel value xJND(x) Expressed as:
TJND(x)=LA(x)+MS(x)-γ·min{LA(x),MS(x)}
where γ is a parameter of the model, LA(x) Is a luminance adaptive visibility threshold, MS(x) Is a spatial mask function;
when embedding two-dimensional code watermark, carrier mapThe pixel value x will change when the change amplitude is at the minimum perceptible difference threshold TJND(x) In range, imperceptible to the human visual system, there is a minimum watermark embedding strength αminMaking the embedded watermark visible, location detection zone IDAnd other regions IRThe watermark embedding parameter range of (a) is expressed as:
α∈[αmin,1]
according to the visual perception model, in order to make the embedded watermark be perceived by human eyes, the difference value of image pixels before and after embedding the watermark is required to exceed the minimum perceptible difference threshold TJND(x) Then, the problem of minimum embedding distortion of the watermark embedding parameter in the visible range is expressed as:
minimize ρi,j(xi,j,yi,j)
subject to|yi,j-xi,j|≥TJND(xi,j)
yi,j=(1-αi,j)xi,ji,jwi,j
and constructing a reconstruction data packet P by pixel difference values of the secret carrier image and the carrier image, and expressing that:
P={δm,nm,n=ym,n-xm,n}
wherein (m, n) represents the position points in the entire carrier image and the secret image;
and compressing the reconstruction data packet P by adopting a JBIG compression algorithm, and embedding the compressed reconstruction data packet by using a traditional reversible information algorithm.
7. The image privacy protection method based on the two-dimensional code and the reversible visual watermark, as claimed in claim 1, wherein for an authorized image receiver, the embedded two-dimensional code can be extracted from the secret-carrying image, so as to obtain encrypted privacy information, and the privacy information is obtained by decryption, and the privacy information is fused to obtain an original image, including:
for an authorized image receiver, extracting the two-dimensional code in the encrypted image according to the watermark key;
according to the uniform resource locator obtained by decoding the two-dimensional code, encrypted privacy information is further obtained;
and obtaining the decrypted private information by using the encryption key, simultaneously embedding a pixel difference value between the secret-carrying image and the carrier image into the secret-carrying image to form a reconstruction data packet, extracting the reconstruction data packet, restoring the image with the private information by combining the secret-carrying image, and fusing the private information to obtain the original image.
CN201911301386.9A 2019-12-17 2019-12-17 Image privacy protection method based on two-dimensional code and reversible visual watermark Pending CN111050021A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911301386.9A CN111050021A (en) 2019-12-17 2019-12-17 Image privacy protection method based on two-dimensional code and reversible visual watermark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911301386.9A CN111050021A (en) 2019-12-17 2019-12-17 Image privacy protection method based on two-dimensional code and reversible visual watermark

Publications (1)

Publication Number Publication Date
CN111050021A true CN111050021A (en) 2020-04-21

Family

ID=70236762

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911301386.9A Pending CN111050021A (en) 2019-12-17 2019-12-17 Image privacy protection method based on two-dimensional code and reversible visual watermark

Country Status (1)

Country Link
CN (1) CN111050021A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112765655A (en) * 2021-01-07 2021-05-07 支付宝(杭州)信息技术有限公司 Control method and device based on private data outgoing
CN113743518A (en) * 2021-09-09 2021-12-03 中国科学技术大学 Approximate reversible image translation method based on joint interframe coding and embedding
CN114662143A (en) * 2022-02-28 2022-06-24 北京交通大学 Sensitive link privacy protection method based on graph embedding
CN115564634A (en) * 2022-12-05 2023-01-03 杭州海康威视数字技术股份有限公司 Video anti-watermark embedding method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102194204A (en) * 2010-03-15 2011-09-21 北京大学 Method and device for embedding and extracting reversible watermarking as well as method and device for recovering image
CN107545390A (en) * 2017-09-06 2018-01-05 中国科学技术大学 Information concealing method, device and logistics implementation method, apparatus and system
CN108566373A (en) * 2018-03-06 2018-09-21 清华大学 Protect the location information delivery system of privacy of user
CN110322387A (en) * 2019-07-09 2019-10-11 中国科学技术大学 A kind of reversible visual watermark method being adapted to picture material
CN110503591A (en) * 2018-05-16 2019-11-26 武汉智云星达信息技术有限公司 The method that effective intelligent image zooming-out and certification based on feature contour two dimension code watermark compare

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102194204A (en) * 2010-03-15 2011-09-21 北京大学 Method and device for embedding and extracting reversible watermarking as well as method and device for recovering image
CN107545390A (en) * 2017-09-06 2018-01-05 中国科学技术大学 Information concealing method, device and logistics implementation method, apparatus and system
CN108566373A (en) * 2018-03-06 2018-09-21 清华大学 Protect the location information delivery system of privacy of user
CN110503591A (en) * 2018-05-16 2019-11-26 武汉智云星达信息技术有限公司 The method that effective intelligent image zooming-out and certification based on feature contour two dimension code watermark compare
CN110322387A (en) * 2019-07-09 2019-10-11 中国科学技术大学 A kind of reversible visual watermark method being adapted to picture material

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
严文博,姚远志,张卫明,俞能海: "基于二维码和信息隐藏的物流***隐私保护方案", 《网络与信息安全学报》 *
姚远志,王锋,严文博,俞能海: "基于二维码和可逆可视水印的图像隐私保护方案", 《通信学报》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112765655A (en) * 2021-01-07 2021-05-07 支付宝(杭州)信息技术有限公司 Control method and device based on private data outgoing
CN113743518A (en) * 2021-09-09 2021-12-03 中国科学技术大学 Approximate reversible image translation method based on joint interframe coding and embedding
CN113743518B (en) * 2021-09-09 2024-04-02 中国科学技术大学 Approximate reversible image translation method based on joint inter-frame coding and embedding
CN114662143A (en) * 2022-02-28 2022-06-24 北京交通大学 Sensitive link privacy protection method based on graph embedding
CN114662143B (en) * 2022-02-28 2024-05-03 北京交通大学 Sensitive link privacy protection method based on graph embedding
CN115564634A (en) * 2022-12-05 2023-01-03 杭州海康威视数字技术股份有限公司 Video anti-watermark embedding method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
Sari Secure image steganography algorithm based on dct with otp encryption
Zhou et al. Secure reversible image data hiding over encrypted domain via key modulation
CN111050021A (en) Image privacy protection method based on two-dimensional code and reversible visual watermark
Zhang et al. Reversibility improved data hiding in encrypted images
Ou et al. High payload image steganography with minimum distortion based on absolute moment block truncation coding
Sajasi et al. An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method
AU2005255946C1 (en) Systems and methods for digital content security
Hurrah et al. Embedding in medical images: an efficient scheme for authentication and tamper localization
CN111917558B (en) Video frame data double-authentication and hierarchical encryption method based on block chain
Yang et al. A secure removable visible watermarking for BTC compressed images
Yang et al. Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing.
Chowdhuri et al. Hiding data in dual color images reversibly via weighted matrix
Rejani et al. Pixel pattern based steganography on images
Lin et al. Joint fingerprinting and decryption with noise-resistant for vector quantization images
Lian Quasi-commutative watermarking and encryption for secure media content distribution
CN108322750A (en) Encrypted domain HEVC video data hidden methods based on residual error coefficient modulation
Xu et al. A content security protection scheme in JPEG compressed domain
Li et al. A new robust watermarhing scheme based on shuffled frog leaping algorithm
Jaheel et al. A novel approach of combining steganography algorithms
Han et al. DWT-domain dual watermarking algorithm of color image based on visual cryptography
CN103034971A (en) BTC-combined visible watermark erasing scheme
Brar et al. Double layer image security system using encryption and steganography
Naji et al. " Stego-Analysis Chain, Session One" Investigations on Steganography Weakness vs Stego-Analysis System for Multimedia File
Qu et al. Reversible data hiding in encrypted image with secure multi-party for telemedicine applications
Mstafa Reversible video steganography using quick response codes and modified elgamal cryptosystem

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200421