WO2019041769A1 - 图片处理方法及应用服务器 - Google Patents

图片处理方法及应用服务器 Download PDF

Info

Publication number
WO2019041769A1
WO2019041769A1 PCT/CN2018/077340 CN2018077340W WO2019041769A1 WO 2019041769 A1 WO2019041769 A1 WO 2019041769A1 CN 2018077340 W CN2018077340 W CN 2018077340W WO 2019041769 A1 WO2019041769 A1 WO 2019041769A1
Authority
WO
WIPO (PCT)
Prior art keywords
watermark
picture
key
modified
feature data
Prior art date
Application number
PCT/CN2018/077340
Other languages
English (en)
French (fr)
Inventor
王佳
徐佳良
范玉磊
余自雷
黄世光
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2019041769A1 publication Critical patent/WO2019041769A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0051Embedding of the watermark in the spatial domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection

Definitions

  • the present application relates to the field of data processing technologies, and in particular, to a picture processing method and an application server.
  • the present application proposes a picture processing method and an application server to solve the problem of how to simultaneously satisfy the watermark that is both sensitive enough and not too large.
  • the present application provides a picture processing method, the method comprising the steps of:
  • a key A2 and a key B2 corresponding to the watermark A3 and the watermark B3 are placed.
  • the present application further provides an application server, including a memory, a processor, and a picture processing system stored on the memory and operable on the processor, where the picture processing system is The processor implements the following steps when it executes:
  • a key A2 and a key B2 corresponding to the watermark A3 and the watermark B3 are placed.
  • the present application further provides a computer readable storage medium storing a picture processing system, the picture processing system being executable by at least one processor to enable the At least one processor performs the steps of the picture processing method as described above.
  • the image processing method, the application server and the computer readable storage medium proposed by the present application can provide an overall scheme for authenticating a picture, and encrypt the unique identifier of the picture authority as a watermark A3. And extracting the pixel gray value of the picture to be encrypted as the watermark B3, placing the watermarks A3 and B in the spatial domain of the picture, and then placing the keys A2 and B corresponding to the watermarks A3 and B respectively in the frequency domain of the picture, thereby combining the Lu
  • the techniques of stick watermarking, fragile watermarking, spatial domain watermarking and frequency domain watermarking can not only make the watermark sensitive enough, but also ensure the security of the carried information, and reduce the size of the watermark and the performance loss of the encryption and decryption calculation as much as possible.
  • the pixel gray value of the picture to be authenticated may be similarly encrypted to generate a new watermark, which is compared with the original watermark B3, thereby determining whether the picture is modified
  • 1 is a schematic diagram of an optional hardware architecture of an application server of the present application
  • FIG. 2 is a schematic diagram of a program module of a first embodiment of a picture processing system of the present application
  • FIG. 3 is a schematic diagram of a program module of a second embodiment of a picture processing system of the present application.
  • FIG. 4 is a schematic flow chart of a first embodiment of a picture processing method according to the present application.
  • FIG. 5 is a schematic flowchart of a second embodiment of a picture processing method according to the present application.
  • first, second and the like in the present application are for the purpose of description only, and are not to be construed as indicating or implying their relative importance or implicitly indicating the number of technical features indicated. .
  • features defining “first” and “second” may include at least one of the features, either explicitly or implicitly.
  • the technical solutions between the various embodiments may be combined with each other, but must be based on the realization of those skilled in the art, and when the combination of the technical solutions is contradictory or impossible to implement, it should be considered that the combination of the technical solutions does not exist. Nor is it within the scope of protection required by this application.
  • FIG. 1 it is a schematic diagram of an optional hardware architecture of the application server 2 of the present application.
  • the application server 2 may include, but is not limited to, the memory 11, the processor 12, and the network interface 13 being communicably connected to each other through a system bus. It is pointed out that Figure 1 only shows the application server 2 with components 11-13, but it should be understood that not all illustrated components may be implemented, and more or fewer components may be implemented instead.
  • the application server 2 may be a computing device such as a rack server, a blade server, a tower server, or a rack server.
  • the application server 2 may be an independent server or a server cluster composed of multiple servers. .
  • the memory 11 includes at least one type of readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (eg, SD or DX memory, etc.), a random access memory (RAM), a static Random access memory (SRAM), read only memory (ROM), electrically erasable programmable read only memory (EEPROM), programmable read only memory (PROM), magnetic memory, magnetic disk, optical disk, and the like.
  • the memory 11 may be an internal storage unit of the application server 2, such as a hard disk or memory of the application server 2.
  • the memory 11 may also be an external storage device of the application server 2, such as a plug-in hard disk equipped on the application server 2, a smart memory card (SMC), and a secure digital number. (Secure Digital, SD) card, flash card, etc.
  • the memory 11 can also include both the internal storage unit of the application server 2 and its external storage device.
  • the memory 11 is generally used to store an operating system installed in the application server 2 and various types of application software, such as program code of the image processing system 200. Further, the memory 11 can also be used to temporarily store various types of data that have been output or are to be output.
  • the processor 12 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments.
  • the processor 12 is typically used to control the overall operation of the application server 2.
  • the processor 12 is configured to run program code or process data stored in the memory 11, such as running the picture processing system 200 and the like.
  • the network interface 13 may comprise a wireless network interface or a wired network interface, which is typically used to establish a communication connection between the application server 2 and other electronic devices.
  • the present application proposes a picture processing system 200.
  • FIG. 2 it is a program module diagram of the first embodiment of the picture processing system 200 of the present application.
  • the image processing system 200 includes a series of computer program instructions stored on the memory 11, and when the computer program instructions are executed by the processor 12, the picture processing operations of the embodiments of the present application can be implemented.
  • picture processing system 200 can be divided into one or more modules based on the particular operations implemented by the various portions of the computer program instructions. For example, in FIG. 3, the image processing system 200 can be divided into an acquisition module 201, an encryption module 202, an extraction module 203, and a placement module 204. among them:
  • the obtaining module 201 is configured to acquire a unique identifier A1 of the picture authority.
  • the watermark of the picture is divided into a macroscopically visible and invisible watermark (blind watermark).
  • the invisible watermark is divided into a robust watermark and a fragile watermark.
  • it is divided into a spatial domain watermark and a frequency domain watermark.
  • a hybrid blind watermark is used, that is, a robust watermark, a fragile watermark, a spatial domain watermark, and a frequency domain watermark are combined.
  • the encryption module 202 is configured to encrypt the unique identifier A1 to obtain a watermark A3.
  • the unique identifier A1 is encrypted using a preset key (key A2) and salted to obtain a watermark A3.
  • the salt-salting encryption adds some special characters to the random location in the ciphertext, which is a commonly used encryption technology, and will not be described here. Since the watermark A3 is made according to the separately obtained unique identifier A1, which is independent of the content of the picture, is relatively stable and is a robust watermark, characterized by good resistance to hitting, and the picture is damaged. It is also not easy to destroy in the case, which is used to prove the sovereignty of the picture authority.
  • the extraction module 203 is configured to extract basic feature data B1 of the picture.
  • basic feature data B1 such as a pixel gray value
  • the pixel gray value of the electronic picture certificate needs to be extracted for making a fragile watermark, and the purpose is to issue the credit electronic in the institution. After the report, the electronic picture certificate can not be falsified.
  • the encryption module 202 is configured to encrypt the basic feature data B1 to obtain a watermark B3.
  • the result of the conversion is encrypted using a preset key (key B2) and salting to obtain a watermark B3.
  • key B2 a preset key
  • the watermark B3 is made according to the basic feature data B1 extracted from the picture, and is closely related to the content of the picture, the stability is low, and the watermark is fragile, which is characterized by high sensitivity, and the picture is slightly Upon destruction, the basic feature data B1 (pixel gray value) corresponding to the watermark B3 changes, and can be used to verify whether the picture has been tampered with.
  • the watermark is sensitive enough, the watermark needs to be changed in any modified case, and at the same time, because the watermark needs to be carried in the picture, it cannot Too big. Therefore, in the present scheme, the watermark B3 is prepared by extracting the gray value of the pixel of the picture, and the amount of data is not too large and sensitive enough.
  • the placement module 204 is configured to place a watermark A3 and a watermark B3 in a low-altitude domain of the picture.
  • two watermark information namely the watermark A3 and the watermark B3, are placed. Since the encryption and decryption threshold of the airspace carrying information is low and the calculation loss is small, the encrypted watermark (the data volume is relatively large) can be stored in the airspace. Since both the watermark A3 and the watermark B3 are placed in the low-altitude domain of the picture, they all belong to the spatial domain watermark.
  • the placement module 204 is further configured to place a key A2 and a key B2 corresponding to the watermark A3 and the watermark B3 in the low frequency domain of the picture.
  • the key A2 corresponding to the watermark A3 and the key B2 corresponding to the watermark B3 are placed in the low frequency domain of the picture. Since the frequency domain encryption threshold is high and the calculation loss is large, the key information (the amount of data is relatively small) can be stored in the frequency domain. By thus storing the information in the airspace and the frequency domain, the security of the carried information is guaranteed, and the performance loss of the calculation is reduced as much as possible.
  • the image processing system 200 includes a comparison module 205 in addition to the acquisition module 201, the encryption module 202, the extraction module 203, and the placement module 204 in the first embodiment.
  • the extracting module 203 is further configured to extract basic feature data C1 and a key B2 of the picture when the picture is authenticated.
  • the corresponding basic feature data C1 (pixel gray value) needs to be extracted from the picture, and from the The low frequency domain of the picture extracts the information of the key B2 carried, and is used to generate a watermark in the same way to compare with the watermark B3.
  • the encryption module 202 is further configured to encrypt the basic feature data C1 by using the key B2 to obtain a watermark C3.
  • the result of the conversion is encrypted using the key B2 and the salt to obtain the watermark C3.
  • the extraction module 203 is further configured to extract the watermark B3 from the low-altitude domain of the picture.
  • the information of the watermark B3 carried can be extracted from the low-altitude domain of the picture.
  • the comparing module 205 is configured to compare whether the watermark B3 and the watermark C3 are consistent, thereby determining whether the picture is modified.
  • both the watermark B3 and the watermark C3 are obtained by encrypting the basic feature data of the picture using the key B2 in the same manner, by comparing whether the watermark B3 and the watermark C3 are identical, Determine if the picture has been modified. If the watermark B3 is consistent with the watermark C3, it indicates that the picture has not been modified. If the watermark B3 does not coincide with the watermark C3, it indicates that the picture has been modified, not the original picture.
  • both the watermark B3 and the watermark C3 are obtained by encrypting the same according to the pixel gray value using the key B2, if the watermark B3 is inconsistent with the watermark C3. , it means that the original image and the pixel to be identified have different gray values, so it can be determined that the image to be identified has been modified, which is different from the original image.
  • the present application also proposes a picture processing method.
  • FIG. 4 it is a schematic flowchart of the first embodiment of the image processing method of the present application.
  • the order of execution of the steps in the flowchart shown in FIG. 4 may be changed according to different requirements, and some steps may be omitted.
  • Step S600 Acquire a unique identifier A1 of the picture authority.
  • the watermark of the picture is divided into a visible and invisible watermark (blind watermark), and the invisible watermark is divided into a robust watermark and a fragile watermark. According to the way the watermark is stored, it is divided into a spatial domain watermark and a frequency domain watermark.
  • a hybrid blind watermark is used, that is, a robust watermark, a fragile watermark, a spatial domain watermark, and a frequency domain watermark are combined.
  • the unique identifier A1 of the (original) picture authority is obtained for making a robust watermark, and the purpose is to announce the copyright of the picture after the institution issues the picture.
  • Step S602 encrypting the unique identifier A1 to obtain a watermark A3.
  • the unique identifier A1 is encrypted using a preset key (key A2) and salted to obtain a watermark A3.
  • the watermark A3 is a robust watermark, which is characterized by good resistance to hitting, and is not easily destroyed in the case where the picture is damaged, and is used to prove the sovereignty of the picture issuing authority.
  • Step S604 extracting basic feature data B1 of the picture.
  • basic feature data B1 such as a pixel gray value
  • the pixel gray value of the electronic picture certificate needs to be extracted for making a fragile watermark, and the purpose is to issue the credit electronic in the institution. After the report, the electronic picture certificate can not be falsified.
  • Step S606 encrypting the basic feature data B1 to obtain a watermark B3.
  • the result of the conversion is encrypted using a preset key (key B2) and salting to obtain a watermark B3.
  • the watermark B3 is a fragile watermark, which is characterized by high sensitivity, and the picture is slightly destroyed.
  • the basic feature data B1 (pixel gray value) corresponding to the watermark B3 changes, and can be used to verify whether the picture has been tampered with.
  • the watermark is sensitive enough, the watermark needs to be changed in any modified case, and at the same time, because the watermark needs to be carried in the picture, it cannot Too big. Therefore, in the present scheme, the watermark B3 is prepared by extracting the gray value of the pixel of the picture, and the amount of data is not too large and sensitive enough.
  • Step S608 in the low-altitude domain of the picture, the watermark A3 and the watermark B3 are placed.
  • two watermark information namely the watermark A3 and the watermark B3, are placed. Since the encryption and decryption threshold of the airspace carrying information is low and the calculation loss is small, the encrypted watermark (the data volume is relatively large) can be stored in the airspace.
  • Step S610 in the low frequency domain of the picture, the key A2 and the key B2 corresponding to the watermark A3 and the watermark B3 are placed.
  • the key A2 corresponding to the watermark A3 and the key B2 corresponding to the watermark B3 are placed in the low frequency domain of the picture. Since the frequency domain encryption threshold is high and the calculation loss is large, the key information (the amount of data is relatively small) can be stored in the frequency domain. By thus storing the information in the airspace and the frequency domain, the security of the carried information is guaranteed, and the performance loss of the calculation is reduced as much as possible.
  • the image processing method provided in this embodiment can provide an overall scheme for authenticating a picture.
  • the unique identifier of the picture issuing authority is encrypted and used as the watermark A3, and the pixel gray value of the extracted picture is encrypted and used as the watermark B3.
  • the watermarks A3 and B are placed in the airspace of the picture, and then the keys A2 and B corresponding to the watermarks A3 and B respectively are placed in the frequency domain of the picture, thereby combining the robust watermark, the fragile watermark, the spatial watermark and the frequency domain watermark.
  • the technology not only makes the watermark sensitive enough, but also ensures the security of the carried information, and reduces the size of the watermark and the performance loss of the encryption and decryption calculation as much as possible.
  • FIG. 5 it is a schematic flowchart of a second embodiment of the image processing method of the present application.
  • the steps S700-S710 of the picture processing method are similar to the steps S600-S610 of the first embodiment, except that the method further includes steps S712-S718.
  • the method includes the following steps:
  • Step S700 Acquire a unique identifier A1 of the picture issuing authority.
  • the watermark of the picture is divided into a visible and invisible watermark (blind watermark), and the invisible watermark is divided into a robust watermark and a fragile watermark. According to the way the watermark is stored, it is divided into a spatial domain watermark and a frequency domain watermark.
  • a hybrid blind watermark is used, that is, a robust watermark, a fragile watermark, a spatial domain watermark, and a frequency domain watermark are combined.
  • the unique identifier A1 of the (original) picture authority is obtained for making a robust watermark, and the purpose is to announce the copyright of the picture after the institution issues the picture.
  • Step S702 encrypting the unique identifier A1 to obtain a watermark A3.
  • the unique identifier A1 is encrypted using a preset key (key A2) and salted to obtain a watermark A3.
  • the watermark A3 is a robust watermark, which is characterized by good resistance to hitting, and is not easily destroyed in the case where the picture is damaged, and is used to prove the sovereignty of the picture issuing authority.
  • Step S704 extracting basic feature data B1 of the picture.
  • basic feature data B1 such as a pixel gray value
  • the pixel gray value of the electronic picture certificate needs to be extracted for making a fragile watermark, and the purpose is to issue the credit electronic in the institution. After the report, the electronic picture certificate can not be falsified.
  • Step S706 encrypting the basic feature data B1 to obtain a watermark B3.
  • the result of the conversion is encrypted using a preset key (key B2) and salting to obtain a watermark B3.
  • the watermark B3 is a fragile watermark, which is characterized by high sensitivity, and the picture is slightly destroyed.
  • the basic feature data B1 (pixel gray value) corresponding to the watermark B3 changes, and can be used to verify whether the picture has been tampered with.
  • the watermark is sensitive enough, the watermark needs to be changed in any modified case, and at the same time, because the watermark needs to be carried in the picture, it cannot Too big. Therefore, in the present scheme, the watermark B3 is prepared by extracting the gray value of the pixel of the picture, and the amount of data is not too large and sensitive enough.
  • Step S708 in the low-altitude field of the picture, the watermark A3 and the watermark B3 are placed.
  • two watermark information namely the watermark A3 and the watermark B3, are placed. Since the encryption and decryption threshold of the airspace carrying information is low and the calculation loss is small, the encrypted watermark (the data volume is relatively large) can be stored in the airspace.
  • Step S710 in the low frequency domain of the picture, the key A2 and the key B2 corresponding to the watermark A3 and the watermark B3 are placed.
  • the key A2 corresponding to the watermark A3 and the key B2 corresponding to the watermark B3 are placed in the low frequency domain of the picture. Since the frequency domain encryption threshold is high and the calculation loss is large, the key information (the amount of data is relatively small) can be stored in the frequency domain. By thus storing the information in the airspace and the frequency domain, the security of the carried information is guaranteed, and the performance loss of the calculation is reduced as much as possible.
  • Step S712 when the picture is identified, the basic feature data C1 and the key B2 of the picture are extracted.
  • the corresponding basic feature data C1 (pixel gray value) needs to be extracted from the picture, and from the The low frequency domain of the picture extracts the information of the key B2 carried, and is used to generate a watermark in the same way to compare with the watermark B3.
  • Step S714 encrypting the basic feature data C1 using the key B2 to obtain a watermark C3.
  • the result of the conversion is encrypted using the key B2 and the salt to obtain the watermark C3.
  • Step S716, extracting the watermark B3 from the low-altitude domain of the picture.
  • the information of the watermark B3 carried can be extracted from the low-altitude domain of the picture.
  • Step S718, comparing whether the watermark B3 and the watermark C3 are consistent, thereby determining whether the picture is modified.
  • both the watermark B3 and the watermark C3 are obtained by encrypting the basic feature data of the picture using the key B2 in the same manner, by comparing whether the watermark B3 and the watermark C3 are identical, Determine if the picture has been modified. If the watermark B3 is consistent with the watermark C3, it indicates that the picture has not been modified. If the watermark B3 does not coincide with the watermark C3, it indicates that the picture has been modified, not the original picture.
  • both the watermark B3 and the watermark C3 are obtained by encrypting the same according to the pixel gray value using the key B2, if the watermark B3 is inconsistent with the watermark C3. , it means that the original image and the pixel to be identified have different gray values, so it can be determined that the image to be identified has been modified, which is different from the original image.
  • the image processing method provided in this embodiment can provide an overall scheme for authenticating a picture.
  • the unique identifier of the picture issuing authority is encrypted and used as the watermark A3, and the pixel gray value of the extracted picture is encrypted and used as the watermark B3.
  • the watermarks A3 and B are placed in the airspace of the picture, and then the keys A2 and B corresponding to the watermarks A3 and B respectively are placed in the frequency domain of the picture, thereby combining the robust watermark, the fragile watermark, the spatial watermark and the frequency domain watermark.
  • the technology not only makes the watermark sensitive enough, but also ensures the security of the carried information, and reduces the size of the watermark and the performance loss of the encryption and decryption calculation as much as possible.
  • the pixel gray value of the picture to be authenticated may be similarly encrypted to generate a new watermark, which is compared with the original watermark B3, thereby determining whether the picture is modified or not.
  • the picture is authentic.
  • the foregoing embodiment method can be implemented by means of software plus a necessary general hardware platform, and of course, can also be through hardware, but in many cases, the former is better.
  • Implementation Based on such understanding, the technical solution of the present application, which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
  • the optical disc includes a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the methods described in various embodiments of the present application.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

本申请公开了一种图片处理方法,该方法包括:获取所述图片的颁发机构的唯一标识A1;对所述唯一标识A1使用密钥A2进行加密,得到水印A3;提取所述图片的基本特征数据B1;对所述基本特征数据B1使用密钥B2进行加密,得到水印B3;在所述图片的低空域,放置水印A3和水印B3;在所述图片的低频域,放置水印A3和水印B3对应的密钥A2和密钥B2。本申请还提供一种应用服务器及计算机可读存储介质。本申请提供的图片处理方法、应用服务器及计算机可读存储介质能够防止和识别图片被篡改。

Description

图片处理方法及应用服务器
本申请要求于2017年8月31日提交中国专利局、申请号为201710776216.0、发明名称为“图片处理方法及应用服务器”的中国专利申请的优先权,其全部内容通过引用结合在申请中。
技术领域
本申请涉及数据处理技术领域,尤其涉及一种图片处理方法及应用服务器。
背景技术
近年来,随着计算机技术和图像处理技术的发展,特别是一些尖端的图像处理软件的出现,导致制造与真实图像难以区分的伪造图像变得非常容易,给我们的社会产生严重的影响。尤其是在互联网金融和法律领域,电子证书、合同等图片的篡改、伪造更是会带来巨大危害。常用的防止和识别图片被篡改的方法是在图片中嵌入水印。但是,水印既要足够敏感,使得图片在任何修改的情况下,水印都要变化,同时,因为水印需要携带在图片中,所以又不能太大。而现有的方法很难同时达到这两个要求。
发明内容
有鉴于此,本申请提出一种图片处理方法及应用服务器,以解决如何同时满足水印既要足够敏感又不能太大的问题。
首先,为实现上述目的,本申请提出一种图片处理方法,该方法包括步骤:
获取所述图片的颁发机构的唯一标识A1;
对所述唯一标识A1使用密钥A2进行加密,得到水印A3;
提取所述图片的基本特征数据B1;
对所述基本特征数据B1使用密钥B2进行加密,得到水印B3;
在所述图片的低空域,放置水印A3和水印B3;及
在所述图片的低频域,放置水印A3和水印B3对应的密钥A2和密钥B2。
此外,为实现上述目的,本申请还提供一种应用服务器,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的图片处理***,所述图片处理***被所述处理器执行时实现如下步骤:
获取所述图片的颁发机构的唯一标识A1;
对所述唯一标识A1使用密钥A2进行加密,得到水印A3;
提取所述图片的基本特征数据B1;
对所述基本特征数据B1使用密钥B2进行加密,得到水印B3;
在所述图片的低空域,放置水印A3和水印B3;及
在所述图片的低频域,放置水印A3和水印B3对应的密钥A2和密钥B2。
进一步地,为实现上述目的,本申请还提供一种计算机可读存储介质,所述计算机可读存储介质存储有图片处理***,所述图片处理***可被至少一个处理器执行,以使所述至少一个处理器执行如上述的图片处理方法的步骤。
相较于现有技术,本申请所提出的图片处理方法、应用服务器及计算机可读存储介质,可以提供一种对图片真伪鉴别的整体方案,将图片颁发机构的唯一标识加密后作为水印A3,并提取图片的像素灰度值加密后作为水印B3,将水印A3和B放置在图片的空域,然后将水印A3和B分别对应的密钥A2和B放置在图片的频域,从而结合鲁棒性水印、脆弱性水印、空域水印和频域水印的技术,既可以使水印足够敏感,保障了携带信息的安全性,又尽可能地降低了水印的大小和加解密计算的性能损耗。另外,在对所述图片进行鉴别时,可以同样提取待鉴别图片的像素灰度值加密后生成新的水印, 与原水印B3进行比较是否一致,从而判断出所述图片是否被修改,鉴别出图片真伪。
附图说明
图1是本申请应用服务器一可选的硬件架构的示意图;
图2是本申请图片处理***第一实施例的程序模块示意图;
图3是本申请图片处理***第二实施例的程序模块示意图;
图4是本申请图片处理方法第一实施例的流程示意图;
图5是本申请图片处理方法第二实施例的流程示意图。
附图标记:
应用服务器 2
存储器 11
处理器 12
网络接口 13
图片处理*** 200
获取模块 201
加密模块 202
提取模块 203
放置模块 204
比较模块 205
本申请目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
具体实施方式
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅用以解释本申请,并不用于限定本申请。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
需要说明的是,在本申请中涉及“第一”、“第二”等的描述仅用于描述目的,而不能理解为指示或暗示其相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。另外,各个实施例之间的技术方案可以相互结合,但是必须是以本领域普通技术人员能够实现为基础,当技术方案的结合出现相互矛盾或无法实现时应当认为这种技术方案的结合不存在,也不在本申请要求的保护范围之内。
参阅图1所示,是本申请应用服务器2一可选的硬件架构的示意图。
本实施例中,所述应用服务器2可包括,但不仅限于,可通过***总线相互通信连接存储器11、处理器12、网络接口13。需要指出的是,图1仅示出了具有组件11-13的应用服务器2,但是应理解的是,并不要求实施所有示出的组件,可以替代的实施更多或者更少的组件。
其中,所述应用服务器2可以是机架式服务器、刀片式服务器、塔式服务器或机柜式服务器等计算设备,该应用服务器2可以是独立的服务器,也可以是多个服务器所组成的服务器集群。
所述存储器11至少包括一种类型的可读存储介质,所述可读存储介质包括闪存、硬盘、多媒体卡、卡型存储器(例如,SD或DX存储器等)、随机访问存储器(RAM)、静态随机访问存储器(SRAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、可编程只读存储器(PROM)、磁性存储器、磁盘、光盘等。在一些实施例中,所述存储器11可以是所述应用服务 器2的内部存储单元,例如该应用服务器2的硬盘或内存。在另一些实施例中,所述存储器11也可以是所述应用服务器2的外部存储设备,例如该应用服务器2上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。当然,所述存储器11还可以既包括所述应用服务器2的内部存储单元也包括其外部存储设备。本实施例中,所述存储器11通常用于存储安装于所述应用服务器2的操作***和各类应用软件,例如图片处理***200的程序代码等。此外,所述存储器11还可以用于暂时地存储已经输出或者将要输出的各类数据。
所述处理器12在一些实施例中可以是中央处理器(Central Processing Unit,CPU)、控制器、微控制器、微处理器、或其他数据处理芯片。该处理器12通常用于控制所述应用服务器2的总体操作。本实施例中,所述处理器12用于运行所述存储器11中存储的程序代码或者处理数据,例如运行所述的图片处理***200等。
所述网络接口13可包括无线网络接口或有线网络接口,该网络接口13通常用于在所述应用服务器2与其他电子设备之间建立通信连接。
至此,己经详细介绍了本申请相关设备的硬件结构和功能。下面,将基于上述介绍提出本申请的各个实施例。
首先,本申请提出一种图片处理***200。
参阅图2所示,是本申请图片处理***200第一实施例的程序模块图。
本实施例中,所述图片处理***200包括一系列的存储于存储器11上的计算机程序指令,当该计算机程序指令被处理器12执行时,可以实现本申请各实施例的图片处理操作。在一些实施例中,基于该计算机程序指令各部分所实现的特定的操作,图片处理***200可以被划分为一个或多个模块。例如,在图3中,所述图片处理***200可以被分割成获取模块201、加密模块202、提取模块203、放置模块204。其中:
所述获取模块201,用于获取所述图片颁发机构的唯一标识A1。
具体地,图片的水印分为肉眼可见及不可见水印(盲水印)。根据水印的稳定性,不可见水印分为鲁棒性水印和脆弱性水印。根据水印的存放方式,分为空域水印和频域水印。在本方案中,采用混合式盲水印,即将鲁棒性水印、脆弱性水印、空域水印和频域水印进行结合。首先,获取所述(原始)图片颁发机构的唯一标识A1,用于制作鲁棒性水印,目的是在机构颁发所述图片后,宣告所述图片的版权。
以所述图片为信用电子报告的电子图片证书为例,需要获取该信用电子报告的颁发机构的唯一标识A1,利用报告颁发机构的唯一标识A1制作鲁棒性水印,目的是在机构颁发该信用电子报告后,宣告该信用电子报告的版权。
所述加密模块202,用于对所述唯一标识A1进行加密,得到水印A3。
具体地,将所述唯一标识A1使用预设的密钥(密钥A2)及撒盐加密,得到水印A3。所述撒盐加密即向密文里随机位置添加一些特殊字符,为常用的加密技术,在此不再赘述。由于所述水印A3是根据另外获取的所述唯一标识A1制作的,与所述图片的内容无关,所以比较稳定,为鲁棒性水印,特点是抗击打性好,在所述图片被损坏的情况下也不易破坏,用来证明所述图片颁发机构的主权性。
所述提取模块203,用于提取所述图片的基本特征数据B1。
具体地,在生成所述图片时,需要提取所述图片的基本特征数据B1(如像素灰度值),用于制作脆弱性水印,目的是在机构颁发所述图片后,保障所述图片的不可篡改。
以所述图片为信用电子报告的电子图片证书为例,在生成该电子图片证书时,需要提取该电子图片证书的像素灰度值,用于制作脆弱性水印,目的是在机构颁发该信用电子报告后,保障该电子图片证书的不可篡改。
所述加密模块202,用于对所述基本特征数据B1进行加密,得到水印B3。
具体地,在将所提取的基本特征数据B1做傅立叶频率转换后,将转换生 成的结果使用预设的密钥(密钥B2)及撒盐加密,得到水印B3。由于所述水印B3是根据从所述图片中提取的基本特征数据B1制作的,与所述图片的内容息息相关,所以稳定性较低,为脆弱性水印,特点是敏感性高,所述图片稍一破坏,水印B3对应的基本特征数据B1(像素灰度值)即发生变化,可用来验证所述图片是否被篡改。
整个技术方案的关键,在于水印的制作方案上:水印既要足够敏感,所述图片在任何修改的情况下,水印都要变化,同时,因为水印需要携带在所述图片中,所以,又不能太大。因此,在本方案中,采用了提取所述图片的像素灰度值的方式来制作水印B3,数据量不太大,又足够敏感。
所述放置模块204,用于在所述图片的低空域,放置水印A3和水印B3。
具体地,在所述图片的低空域,放置两个水印信息,即所述水印A3和水印B3。由于空域携带信息的加解密门槛低,计算损耗较小,因此可将加密后的水印(数据量比较大)存放在空域。由于所述水印A3和水印B3均放置在所述图片的低空域,因此均属于空域水印。
所述放置模块204还用于在所述图片的低频域,放置水印A3和水印B3对应的密钥A2和密钥B2。
具体地,在所述图片的低频域,放置两个密钥信息,即水印A3对应的密钥A2和水印B3对应的密钥B2。由于频域加密门槛高,计算损耗大,因此可将密钥信息(数据量比较小)存放在频域。如此在空域和频域混合存放信息,即保障了携带信息的安全性,又尽可能地降低了计算的性能损耗。
参阅图3所示,是本申请图片处理***200第二实施例的程序模块图。本实施例中,所述的图片处理***200除了包括第一实施例中的所述获取模块201、加密模块202、提取模块203、放置模块204之外,还包括比较模块205。
所述提取模块203还用于当鉴别所述图片时,提取所述图片的基本特征数据C1和密钥B2。
具体地,当收到所述(待鉴别)图片后,若要鉴别所述图片的真伪,需要从所述图片中提取出相应的基本特征数据C1(像素灰度值),并从所述图片的低频域提取出携带的所述密钥B2的信息,用于按同样的方式再生成一个水印来与所述水印B3进行对比。
所述加密模块202还用于使用所述密钥B2对所述基本特征数据C1进行加密,得到水印C3。
具体地,在将所提取的基本特征数据C1做傅立叶频率转换后,将转换生成的结果使用所述密钥B2及撒盐加密,得到水印C3。
所述提取模块203还用于从所述图片的低空域提取水印B3。
具体地,由于所述图片生成后已将所述水印B3放置到低空域,因此可以从所述图片的低空域提取出携带的所述水印B3的信息。
所述比较模块205,用于比较所述水印B3与水印C3是否一致,从而判断所述图片是否被修改。
具体地,由于所述水印B3与水印C3均是将所述图片的基本特征数据使用密钥B2按同样的方式加密处理后得到的,因此通过比较所述水印B3与水印C3是否一致,即可判断出所述图片是否被修改。若所述水印B3与水印C3一致,则表示所述图片未被修改。若所述水印B3与水印C3不一致,则表示所述图片已被修改,不是原始图片。
例如,当所述基本特征数据为像素灰度值时,水印B3与水印C3均是根据像素灰度值使用密钥B2按同样的方式加密处理后得到的,若所述水印B3与水印C3不一致,则表示原始图片和待鉴别图片的像素灰度值不一样,因此可以判断出待鉴别图片已被修改,与原始图片不一样。
以所述图片为信用电子报告的电子图片证书为例,结合以上综合性盲水印方案,可确保所述信用电子报告的电子图片证书从颁发开始,可安全地在各个机构间流转,达到了纸质报告合同的***效果。
此外,本申请还提出一种图片处理方法。
参阅图4所示,是本申请图片处理方法第一实施例的流程示意图。在本实施例中,根据不同的需求,图4所示的流程图中的步骤的执行顺序可以改变,某些步骤可以省略。
步骤S600,获取所述图片颁发机构的唯一标识A1。
具体地,图片的水印分为肉眼可见及不可见水印(盲水印),不可见水印分为鲁棒性水印和脆弱性水印。根据水印的存放方式,分为空域水印和频域水印。在本方案中,采用混合式盲水印,即将鲁棒性水印、脆弱性水印、空域水印和频域水印进行结合。首先,获取所述(原始)图片颁发机构的唯一标识A1,用于制作鲁棒性水印,目的是在机构颁发所述图片后,宣告所述图片的版权。
以所述图片为信用电子报告的电子图片证书为例,需要获取该信用电子报告的颁发机构的唯一标识A1,利用报告颁发机构的唯一标识A1制作鲁棒性水印,目的是在机构颁发该信用电子报告后,宣告该信用电子报告的版权。
步骤S602,对所述唯一标识A1进行加密,得到水印A3。
具体地,将所述唯一标识A1使用预设的密钥(密钥A2)及撒盐加密,得到水印A3。所述水印A3为鲁棒性水印,特点是抗击打性好,在所述图片被损坏的情况下也不易破坏,用来证明所述图片颁发机构的主权性。
步骤S604,提取所述图片的基本特征数据B1。
具体地,在生成所述图片时,需要提取所述图片的基本特征数据B1(如像素灰度值),用于制作脆弱性水印,目的是在机构颁发所述图片后,保障所述图片的不可篡改。
以所述图片为信用电子报告的电子图片证书为例,在生成该电子图片证书时,需要提取该电子图片证书的像素灰度值,用于制作脆弱性水印,目的是在机构颁发该信用电子报告后,保障该电子图片证书的不可篡改。
步骤S606,对所述基本特征数据B1进行加密,得到水印B3。
具体地,在将所提取的基本特征数据B1做傅立叶频率转换后,将转换生成的结果使用预设的密钥(密钥B2)及撒盐加密,得到水印B3。所述水印B3为脆弱性水印,特点是敏感性高,所述图片稍一破坏,水印B3对应的基本特征数据B1(像素灰度值)即发生变化,可用来验证所述图片是否被篡改。
整个技术方案的关键,在于水印的制作方案上:水印既要足够敏感,所述图片在任何修改的情况下,水印都要变化,同时,因为水印需要携带在所述图片中,所以,又不能太大。因此,在本方案中,采用了提取所述图片的像素灰度值的方式来制作水印B3,数据量不太大,又足够敏感。
步骤S608,在所述图片的低空域,放置水印A3和水印B3。
具体地,在所述图片的低空域,放置两个水印信息,即所述水印A3和水印B3。由于空域携带信息的加解密门槛低,计算损耗较小,因此可将加密后的水印(数据量比较大)存放在空域。
步骤S610,在所述图片的低频域,放置水印A3和水印B3对应的密钥A2和密钥B2。
具体地,在所述图片的低频域,放置两个密钥信息,即水印A3对应的密钥A2和水印B3对应的密钥B2。由于频域加密门槛高,计算损耗大,因此可将密钥信息(数据量比较小)存放在频域。如此在空域和频域混合存放信息,即保障了携带信息的安全性,又尽可能地降低了计算的性能损耗。
本实施例所提出的图片处理方法,可以提供一种对图片真伪鉴别的整体方案,将图片颁发机构的唯一标识加密后作为水印A3,并提取图片的像素灰度值加密后作为水印B3,将水印A3和B放置在图片的空域,然后将水印A3和B分别对应的密钥A2和B放置在图片的频域,从而结合鲁棒性水印、脆弱性水印、空域水印和频域水印的技术,既可以使水印足够敏感,保障了携带信息的安全性,又尽可能地降低了水印的大小和加解密计算的性能损耗。
如图5所示,是本申请图片处理方法的第二实施例的流程示意图。本实施 例中,所述图片处理方法的步骤S700-S710与第一实施例的步骤S600-S610相类似,区别在于该方法还包括步骤S712-S718。
该方法包括以下步骤:
步骤S700,获取所述图片颁发机构的唯一标识A1。
具体地,图片的水印分为肉眼可见及不可见水印(盲水印),不可见水印分为鲁棒性水印和脆弱性水印。根据水印的存放方式,分为空域水印和频域水印。在本方案中,采用混合式盲水印,即将鲁棒性水印、脆弱性水印、空域水印和频域水印进行结合。首先,获取所述(原始)图片颁发机构的唯一标识A1,用于制作鲁棒性水印,目的是在机构颁发所述图片后,宣告所述图片的版权。
以所述图片为信用电子报告的电子图片证书为例,需要获取该信用电子报告的颁发机构的唯一标识A1,利用报告颁发机构的唯一标识A1制作鲁棒性水印,目的是在机构颁发该信用电子报告后,宣告该信用电子报告的版权。
步骤S702,对所述唯一标识A1进行加密,得到水印A3。
具体地,将所述唯一标识A1使用预设的密钥(密钥A2)及撒盐加密,得到水印A3。所述水印A3为鲁棒性水印,特点是抗击打性好,在所述图片被损坏的情况下也不易破坏,用来证明所述图片颁发机构的主权性。
步骤S704,提取所述图片的基本特征数据B1。
具体地,在生成所述图片时,需要提取所述图片的基本特征数据B1(如像素灰度值),用于制作脆弱性水印,目的是在机构颁发所述图片后,保障所述图片的不可篡改。
以所述图片为信用电子报告的电子图片证书为例,在生成该电子图片证书时,需要提取该电子图片证书的像素灰度值,用于制作脆弱性水印,目的是在机构颁发该信用电子报告后,保障该电子图片证书的不可篡改。
步骤S706,对所述基本特征数据B1进行加密,得到水印B3。
具体地,在将所提取的基本特征数据B1做傅立叶频率转换后,将转换生 成的结果使用预设的密钥(密钥B2)及撒盐加密,得到水印B3。所述水印B3为脆弱性水印,特点是敏感性高,所述图片稍一破坏,水印B3对应的基本特征数据B1(像素灰度值)即发生变化,可用来验证所述图片是否被篡改。
整个技术方案的关键,在于水印的制作方案上:水印既要足够敏感,所述图片在任何修改的情况下,水印都要变化,同时,因为水印需要携带在所述图片中,所以,又不能太大。因此,在本方案中,采用了提取所述图片的像素灰度值的方式来制作水印B3,数据量不太大,又足够敏感。
步骤S708,在所述图片的低空域,放置水印A3和水印B3。
具体地,在所述图片的低空域,放置两个水印信息,即所述水印A3和水印B3。由于空域携带信息的加解密门槛低,计算损耗较小,因此可将加密后的水印(数据量比较大)存放在空域。
步骤S710,在所述图片的低频域,放置水印A3和水印B3对应的密钥A2和密钥B2。
具体地,在所述图片的低频域,放置两个密钥信息,即水印A3对应的密钥A2和水印B3对应的密钥B2。由于频域加密门槛高,计算损耗大,因此可将密钥信息(数据量比较小)存放在频域。如此在空域和频域混合存放信息,即保障了携带信息的安全性,又尽可能地降低了计算的性能损耗。
步骤S712,鉴别所述图片时,提取所述图片的基本特征数据C1和密钥B2。
具体地,当收到所述(待鉴别)图片后,若要鉴别所述图片的真伪,需要从所述图片中提取出相应的基本特征数据C1(像素灰度值),并从所述图片的低频域提取出携带的所述密钥B2的信息,用于按同样的方式再生成一个水印来与所述水印B3进行对比。
步骤S714,使用所述密钥B2对所述基本特征数据C1进行加密,得到水印C3。
具体地,在将所提取的基本特征数据C1做傅立叶频率转换后,将转换生成的结果使用所述密钥B2及撒盐加密,得到水印C3。
步骤S716,从所述图片的低空域提取水印B3。
具体地,由于所述图片生成后已将所述水印B3放置到低空域,因此可以从所述图片的低空域提取出携带的所述水印B3的信息。
步骤S718,比较所述水印B3与水印C3是否一致,从而判断所述图片是否被修改。
具体地,由于所述水印B3与水印C3均是将所述图片的基本特征数据使用密钥B2按同样的方式加密处理后得到的,因此通过比较所述水印B3与水印C3是否一致,即可判断出所述图片是否被修改。若所述水印B3与水印C3一致,则表示所述图片未被修改。若所述水印B3与水印C3不一致,则表示所述图片已被修改,不是原始图片。
例如,当所述基本特征数据为像素灰度值时,水印B3与水印C3均是根据像素灰度值使用密钥B2按同样的方式加密处理后得到的,若所述水印B3与水印C3不一致,则表示原始图片和待鉴别图片的像素灰度值不一样,因此可以判断出待鉴别图片已被修改,与原始图片不一样。
以所述图片为信用电子报告的电子图片证书为例,结合以上综合性盲水印方案,可确保所述信用电子报告的电子图片证书从颁发开始,可安全地在各个机构间流转,达到了纸质报告合同的***效果。
本实施例所提出的图片处理方法,可以提供一种对图片真伪鉴别的整体方案,将图片颁发机构的唯一标识加密后作为水印A3,并提取图片的像素灰度值加密后作为水印B3,将水印A3和B放置在图片的空域,然后将水印A3和B分别对应的密钥A2和B放置在图片的频域,从而结合鲁棒性水印、脆弱性水印、空域水印和频域水印的技术,既可以使水印足够敏感,保障了携带信息的安全性,又尽可能地降低了水印的大小和加解密计算的性能损耗。另外,在对所述图片进行鉴别时,可以同样提取待鉴别图片的像素灰度值加密后生成新的水印,与原水印B3进行比较是否一致,从而判断出所述图片是否被修改,鉴别出图片真伪。
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
以上仅为本申请的优选实施例,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请的专利保护范围内。

Claims (20)

  1. 一种图片处理方法,应用于应用服务器,其特征在于,所述方法包括步骤:
    获取所述图片的颁发机构的唯一标识A1;
    对所述唯一标识A1使用密钥A2进行加密,得到水印A3;
    提取所述图片的基本特征数据B1;
    对所述基本特征数据B1使用密钥B2进行加密,得到水印B3;
    在所述图片的低空域,放置水印A3和水印B3;及
    在所述图片的低频域,放置水印A3和水印B3对应的密钥A2和密钥B2。
  2. 如权利要求1所述的图片处理方法,其特征在于,该方法还包括步骤:
    鉴别所述图片时,提取所述图片的基本特征数据C1和密钥B2;
    使用所述密钥B2对所述基本特征数据C1进行加密,得到水印C3;
    从所述图片的低空域提取水印B3;及
    比较所述水印B3与水印C3是否一致,从而判断所述图片是否被修改。
  3. 如权利要求2所述的图片处理方法,其特征在于,所述基本特征数据B1为所述图片的像素灰度值。
  4. 如权利要求2所述的图片处理方法,其特征在于,所述水印A3为鲁棒性水印,所述水印B3为脆弱性水印。
  5. 如权利要求3所述的图片处理方法,其特征在于,所述水印A3为鲁棒性水印,所述水印B3为脆弱性水印。
  6. 如权利要求2所述的图片处理方法,其特征在于,所述比较所述水印B3与水印C3是否一致,从而判断所述图片是否被修改的步骤具体包括:
    当所述水印B3与水印C3一致时,表示所述图片未被修改;
    当所述水印B3与水印C3不一致时,表示所述图片已被修改,不是原始图片。
  7. 如权利要求3所述的图片处理方法,其特征在于,所述比较所述水印B3与水印C3是否一致,从而判断所述图片是否被修改的步骤具体包括:
    当所述水印B3与水印C3一致时,表示所述图片未被修改;
    当所述水印B3与水印C3不一致时,表示所述图片已被修改,不是原始图片。
  8. 如权利要求4或5所述的图片处理方法,其特征在于,所述比较所述水印B3与水印C3是否一致,从而判断所述图片是否被修改的步骤具体包括:
    当所述水印B3与水印C3一致时,表示所述图片未被修改;
    当所述水印B3与水印C3不一致时,表示所述图片已被修改,不是原始图片。
  9. 一种应用服务器,其特征在于,所述应用服务器包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的图片处理***,所述图片处理***被所述处理器执行时实现如下步骤:
    获取所述图片的颁发机构的唯一标识A1;
    对所述唯一标识A1使用密钥A2进行加密,得到水印A3;
    提取所述图片的基本特征数据B1;
    对所述基本特征数据B1使用密钥B2进行加密,得到水印B3;
    在所述图片的低空域,放置水印A3和水印B3;及
    在所述图片的低频域,放置水印A3和水印B3对应的密钥A2和密钥B2。
  10. 如权利要求9所述的应用服务器,其特征在于,所述图片处理***被所述处理器执行时还实现步骤:
    鉴别所述图片时,提取所述图片的基本特征数据C1和密钥B2;
    使用所述密钥B2对所述基本特征数据C1进行加密,得到水印C3;
    从所述图片的低空域提取水印B3;及
    比较所述水印B3与水印C3是否一致,从而判断所述图片是否被修改。
  11. 如权利要求10所述的应用服务器,其特征在于,所述基本特征数据B1为所述图片的像素灰度值。
  12. 如权利要求10所述的应用服务器,其特征在于,所述水印A3为鲁棒性水印,所述水印B3为脆弱性水印。
  13. 如权利要求11所述的应用服务器,其特征在于,所述水印A3为鲁棒性水印,所述水印B3为脆弱性水印。
  14. 如权利要求10所述的应用服务器,其特征在于,所述比较所述水印B3与水印C3是否一致,从而判断所述图片是否被修改的步骤具体包括:
    当所述水印B3与水印C3一致时,表示所述图片未被修改;
    当所述水印B3与水印C3不一致时,表示所述图片已被修改,不是原始图片。
  15. 如权利要求11所述的应用服务器,其特征在于,所述比较所述水印B3与水印C3是否一致,从而判断所述图片是否被修改的步骤具体包括:
    当所述水印B3与水印C3一致时,表示所述图片未被修改;
    当所述水印B3与水印C3不一致时,表示所述图片已被修改,不是原始图片。
  16. 如权利要求12所述的应用服务器,其特征在于,所述比较所述水印B3与水印C3是否一致,从而判断所述图片是否被修改的步骤具体包括:
    当所述水印B3与水印C3一致时,表示所述图片未被修改;
    当所述水印B3与水印C3不一致时,表示所述图片已被修改,不是原始图片。
  17. 一种计算机可读存储介质,所述计算机可读存储介质存储有图片处理***,所述图片处理***可被至少一个处理器执行,以使所述至少一个处理器执行如下步骤:
    获取所述图片的颁发机构的唯一标识A1;
    对所述唯一标识A1使用密钥A2进行加密,得到水印A3;
    提取所述图片的基本特征数据B1;
    对所述基本特征数据B1使用密钥B2进行加密,得到水印B3;
    在所述图片的低空域,放置水印A3和水印B3;及
    在所述图片的低频域,放置水印A3和水印B3对应的密钥A2和密钥B2。
  18. 如权利要求17所述的计算机可读存储介质,其特征在于,所述图片处理***被所述处理器执行时还实现步骤:
    鉴别所述图片时,提取所述图片的基本特征数据C1和密钥B2;
    使用所述密钥B2对所述基本特征数据C1进行加密,得到水印C3;
    从所述图片的低空域提取水印B3;及
    比较所述水印B3与水印C3是否一致,从而判断所述图片是否被修改。
  19. 如权利要求18所述的计算机可读存储介质,其特征在于,所述基本特征数据B1为所述图片的像素灰度值。
  20. 如权利要求18或19所述的计算机可读存储介质,其特征在于,所述水印A3为鲁棒性水印,所述水印B3为脆弱性水印;
    所述比较所述水印B3与水印C3是否一致,从而判断所述图片是否被修改的步骤具体包括:
    当所述水印B3与水印C3一致时,表示所述图片未被修改;
    当所述水印B3与水印C3不一致时,表示所述图片已被修改,不是原始图片。
PCT/CN2018/077340 2017-08-31 2018-02-27 图片处理方法及应用服务器 WO2019041769A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710776216.0 2017-08-31
CN201710776216.0A CN107730432B (zh) 2017-08-31 2017-08-31 图片处理方法及应用服务器

Publications (1)

Publication Number Publication Date
WO2019041769A1 true WO2019041769A1 (zh) 2019-03-07

Family

ID=61205727

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/077340 WO2019041769A1 (zh) 2017-08-31 2018-02-27 图片处理方法及应用服务器

Country Status (2)

Country Link
CN (1) CN107730432B (zh)
WO (1) WO2019041769A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107730432B (zh) * 2017-08-31 2020-01-24 深圳壹账通智能科技有限公司 图片处理方法及应用服务器
CN110335188B (zh) * 2019-05-21 2023-07-11 青岛尚融数字科技有限公司 一种使用图片储存公私钥的方法及其私钥信息提取方法

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101009757A (zh) * 2006-12-20 2007-08-01 北京理工大学 一种空域和小波域二重分集的数字水印嵌入和提取算法
CN101355684A (zh) * 2007-07-24 2009-01-28 ***通信集团公司 图像类数字内容发送、接收方法及其发送器和接收器
US20090180152A1 (en) * 2008-01-14 2009-07-16 Xerox Corporation Uv encryption via intelligent halftoning
CN102646259A (zh) * 2012-02-16 2012-08-22 南京邮电大学 一种抗攻击的鲁棒多倍零水印方法
CN107067363A (zh) * 2017-04-18 2017-08-18 海南大学 一种基于像素序关系不变的非盲鲁棒空域图像水印方法
CN107730432A (zh) * 2017-08-31 2018-02-23 上海壹账通金融科技有限公司 图片处理方法及应用服务器

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050078767A (ko) * 2004-02-02 2005-08-08 삼성전자주식회사 디지털 영상 워터마킹 장치 및 그 방법
CN100559396C (zh) * 2007-06-25 2009-11-11 中山大学 一种可抗打印扫描和几何变换的多比特数字水印方法
CN103295184B (zh) * 2013-05-13 2015-09-30 西安电子科技大学 一种频域和空域相结合的半调水印方法
CN104680472B (zh) * 2014-08-02 2017-09-29 兰州交通大学 空域和频域相结合的矢量空间数据多重盲水印方法
CN105761199B (zh) * 2016-03-25 2018-10-12 鲁东大学 一种基于组合域的鲁棒彩色图像水印方法
CN106529316B (zh) * 2016-11-18 2019-06-11 浙江宇视科技有限公司 图像数据加密方法及装置、网络摄像机

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101009757A (zh) * 2006-12-20 2007-08-01 北京理工大学 一种空域和小波域二重分集的数字水印嵌入和提取算法
CN101355684A (zh) * 2007-07-24 2009-01-28 ***通信集团公司 图像类数字内容发送、接收方法及其发送器和接收器
US20090180152A1 (en) * 2008-01-14 2009-07-16 Xerox Corporation Uv encryption via intelligent halftoning
CN102646259A (zh) * 2012-02-16 2012-08-22 南京邮电大学 一种抗攻击的鲁棒多倍零水印方法
CN107067363A (zh) * 2017-04-18 2017-08-18 海南大学 一种基于像素序关系不变的非盲鲁棒空域图像水印方法
CN107730432A (zh) * 2017-08-31 2018-02-23 上海壹账通金融科技有限公司 图片处理方法及应用服务器

Also Published As

Publication number Publication date
CN107730432B (zh) 2020-01-24
CN107730432A (zh) 2018-02-23

Similar Documents

Publication Publication Date Title
Kumar et al. A recent survey on multimedia and database watermarking
US11922532B2 (en) System for mitigating the problem of deepfake media content using watermarking
US11186111B1 (en) Digitally encoded seal for document verification
EP3710974B1 (en) Method and arrangement for detecting digital content tampering
CN104077624A (zh) 带防伪二维码的电子票据的生成方法、校验方法及其***
CN101894238B (zh) 基于双重认证的word文档电子******及方法
KR100335308B1 (ko) 워터마크를 이용한 인간 지각가능 데이터 세트의 배포와 인증 방법 및 그 장치
US7222235B1 (en) Image processing system utilizing digital watermarks in predetermined regions
KR100878579B1 (ko) 워터마킹 방법, 워터마크 확인 방법, 워터마킹 장치 및워터마크 확인 장치
WO2020238051A1 (zh) 基于区块链的电子合同存储方法、装置、电子设备及计算机非易失性可读存储介质
US8230216B2 (en) Information processing apparatus, control method therefor, information processing system, and program
CN111859431B (zh) 电子文件签章方法、装置、电子设备及存储介质
US8327150B2 (en) System, method and program for managing information
CN104063731A (zh) 一种采用数字水印技术的二维码防伪印刷及验证方法
CN108632369A (zh) 一种船舶电子图纸安全显示管理方法
EP2913973A1 (en) Trusted NFC smart poster tag
CN112434319A (zh) 一种用于电子文件的数据加密方法及装置
CN104517257B (zh) 用于制作和验证防伪的数字凭证的方法
WO2019041769A1 (zh) 图片处理方法及应用服务器
CN102567657A (zh) 数字作品权属认证***和方法
JP2017021603A (ja) 正当性確認装置、方法、媒体発行装置、方法、及びプログラム
WO2021120781A1 (zh) 图片版权认证方法、装置及存储介质
CN103390121B (zh) 数字作品权属认证方法和***
CN114841701B (zh) 基于nft的数字艺术品防盗可信交易方法及装置
CN109509095B (zh) 一种结合区块链的视频主动识别方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18851619

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 07.09.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18851619

Country of ref document: EP

Kind code of ref document: A1