CN103984932A - Anti-light face recognition method based on transform domain robust watermark under big data - Google Patents
Anti-light face recognition method based on transform domain robust watermark under big data Download PDFInfo
- Publication number
- CN103984932A CN103984932A CN201410229430.0A CN201410229430A CN103984932A CN 103984932 A CN103984932 A CN 103984932A CN 201410229430 A CN201410229430 A CN 201410229430A CN 103984932 A CN103984932 A CN 103984932A
- Authority
- CN
- China
- Prior art keywords
- face
- watermark
- image
- tested
- feature vector
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Image Processing (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
Description
技术领域technical field
本发明涉及一种多媒体信号处理领域,具体涉及大数据下基于变换域鲁棒水印的抗光照攻击人脸识别方法。The invention relates to the field of multimedia signal processing, in particular to a face recognition method against light attack based on transform domain robust watermark under big data.
技术背景technical background
人脸识别技术作为一种有效的生物特征识别技术,近40年来日益得到工业界和学术界的重视。由于人脸识别技术具有高可接受,自然性,不易被人察觉等优势,因此其在娱乐、犯罪调查、门禁系统、军事等方面有较大用途。As an effective biometric identification technology, face recognition technology has been paid more and more attention by industry and academia in the past 40 years. Because face recognition technology has the advantages of being highly acceptable, natural, and not easy to be detected, it has great uses in entertainment, criminal investigation, access control systems, and military affairs.
目前人脸识别的方法主要是基于PCA、神经网络、SVM等机器学习方法,由于要进行训练学习,对于识别的样本较大,在大数据环境下,学习的时间较长,并且目前的人脸识别方法对于光照变化,表情变化或遮罩等比较敏感,因此如何解决在大数据环境下,抗光照变化、表情变化或遮罩等攻击的人脸识别方法意义重大。At present, face recognition methods are mainly based on machine learning methods such as PCA, neural network, and SVM. Due to the need for training and learning, the recognition samples are relatively large. In the big data environment, the learning time is relatively long, and the current face Recognition methods are sensitive to illumination changes, expression changes, or masks. Therefore, how to solve face recognition methods that resist attacks such as illumination changes, expression changes, or masks in a big data environment is of great significance.
数字水印技术最初是用于互联网上的数字媒体的版权保护,其重要特性为鲁棒性和不可见性;本发明可以把人的签名或ID号等作为水印隐藏在其对应的人脸图像中,利用水印的鲁棒特性实现人脸识别算法,特别对光照、遮挡等攻击具有较好的鲁棒性。目前对于基于大数据环境下,抗光照、遮挡攻击的人脸识别方法研究的较少,目前还没有看到公开的报道。因此研究基于变换域的鲁棒水印技术实现大数据下抗光照攻击的人脸识别方法,有较大的意义。Digital watermarking technology was originally used for copyright protection of digital media on the Internet, and its important characteristics are robustness and invisibility; this invention can hide a person's signature or ID number as a watermark in its corresponding face image , using the robustness of watermark to realize the face recognition algorithm, especially it has good robustness to attacks such as illumination and occlusion. At present, there are few researches on face recognition methods based on big data environment and anti-illumination and occlusion attacks, and no public reports have been seen so far. Therefore, it is of great significance to study the robust watermarking technology based on transform domain to realize the face recognition method against light attack under big data.
发明内容Contents of the invention
发明目的:本发明所要解决的技术问题是针对现有技术的不足,提供高速、高鲁棒性的人脸识别算法。具体公开了一种大数据下基于变换域鲁棒水印的抗光照攻击人脸识别方法,是一种零水印方案,水印的嵌入不影响原始的人脸图像。Purpose of the invention: The technical problem to be solved by the present invention is to provide a high-speed, high-robust face recognition algorithm for the deficiencies of the prior art. Specifically, a face recognition method against light attack based on transform domain robust watermark under big data is disclosed, which is a zero watermark scheme, and the embedding of the watermark does not affect the original face image.
本发明的基本原理是:首先对所有的人脸图像进行全局DCT变换;选取低频部分的前8x8个系数,然后在该系数中寻找一个抗光照攻击的特征向量,并将水印序列与该特征向量相关联实现水印的嵌入;然后对于待测图像,首先计算出其特征向量,然后计算待测图像和原始图像的特征向量的相关系数,利用相关系数最大值,实现人脸的检测;并实现了水印的提取。The basic principle of the present invention is: firstly carry out global DCT transformation to all face images; select the first 8x8 coefficients of the low-frequency part, then find a feature vector against light attack in the coefficients, and combine the watermark sequence with the feature vector Correlation realizes the embedding of the watermark; then for the image to be tested, first calculate its feature vector, then calculate the correlation coefficient of the feature vector of the image to be tested and the original image, and use the maximum value of the correlation coefficient to realize the detection of the face; and realize Watermark extraction.
现对本发明的方法进行详细说明如下:Now the method of the present invention is described in detail as follows:
首先选择一个有意义的二值序列作为水印要嵌入人脸图像中,记为W={w(j)|w(j)=0,1;1≤i≤L};同时,选取设F为原始人脸图像,表示:F={f(i,j)|f(i,j)∈R;1≤i≤M1,1≤j≤N1}。其中,f(i,j)表示原始人脸的像素值。First, select a meaningful binary sequence as the watermark to be embedded in the face image, recorded as W={w(j)|w(j)=0,1; 1≤i≤L}; at the same time, select F as Original face image, expressing: F={f(i,j)|f(i,j)∈R; 1≤i≤M1, 1≤j≤N1}. Among them, f(i,j) represents the pixel value of the original face.
第一部分:水印的嵌入Part 1: Embedding of Watermark
1)通过对所有原始人脸图像F(n)进行全局DCT变换,得到原始图像的特征向量集合V(n);1) By performing global DCT transformation on all original face images F(n), the feature vector set V(n) of the original image is obtained;
先对原始人脸图像F(n)进行全局DCT变换,在频率域的低频系数矩阵FD(i,j)中选取前8×8个系数FD8(i,j),然后再对选取出的系数矩阵FD8(i,j)进行二值化处理,当系数大于或等于零时取1,小于0是取零,得到特征向量V,主要过程描述如下:First, the global DCT transformation is performed on the original face image F(n), and the first 8×8 coefficients FD 8 (i,j) are selected in the low-frequency coefficient matrix FD(i,j) in the frequency domain, and then the selected The coefficient matrix FD 8 (i, j) is binarized. When the coefficient is greater than or equal to zero, it takes 1, and if it is less than 0, it takes zero to obtain the feature vector V. The main process is described as follows:
FD8(i,j)=DCT2(F(i,j))FD 8 (i,j)=DCT2(F(i,j))
V(n)=BINARY(FD8(i,j))V(n)=BINARY(FD 8 (i,j))
2)利用密码学HASH函数,生成含水印信息的二值密钥序列Key(n),实现零水印的嵌入;2) Using the cryptography HASH function to generate a binary key sequence Key(n) containing watermark information to realize the embedding of zero watermark;
Key(n)=V(n)⊕W(n)Key(n)=V(n)⊕W(n)
Key(n)是由所有原始图像的特征向量V(n)和对应的n个数字水印W(n),通过密码学常用的Hash函数生成;这里W(n)由长度为64bit的随机序列组成;保存Key(n),在下面提取水印时要用到;通过将Key(n)作为密钥向第三方申请,以获得人脸图像的使用权和所有权;Key(n) is generated by the eigenvector V(n) of all original images and the corresponding n digital watermarks W(n) through the Hash function commonly used in cryptography; here W(n) consists of a random sequence with a length of 64 bits ;Save Key(n), which will be used when extracting the watermark below; Apply to a third party by using Key(n) as a key to obtain the right to use and ownership of the face image;
第二部分:人脸的识别和水印的提取Part II: Face recognition and watermark extraction
3)求出待测人脸F'的特征向量V';3) Find the feature vector V' of the human face F' to be tested;
设待测人脸为F',经过全局二维DCT变换后得到低频系数矩阵为FD’(i,j),按步骤1)对低频系数矩阵进行二值化处理,求出待测人脸的特征向量V';Assuming the face to be tested is F', after the global two-dimensional DCT transformation, the low-frequency coefficient matrix is obtained as FD'(i,j), and the low-frequency coefficient matrix is binarized according to step 1) to obtain the face to be tested eigenvector V';
FD8'(i,j)=DCT2(F'(i,j))FD 8 '(i,j)=DCT2(F'(i,j))
V'=BINARY(FID'(i,j))V'=BINARY(FID'(i,j))
4)计算待测人脸的特征向量V'与原始人脸的V(n)的相关系数NC(n),进行人脸的识别;4) Calculate the correlation coefficient NC(n) between the eigenvector V' of the human face to be tested and the V(n) of the original human face, and carry out recognition of the human face;
计算V'与V(n)的相关系数最大值所对应的n值,设n=k;根据k值可以得到密钥Key(k)、识别出原始人脸图像为F(k)和嵌入在F(k)的水印值W(k),计算特征向量的归一化相关系数公式如下:Calculate the n value corresponding to the maximum value of the correlation coefficient between V' and V(n), and set n=k; according to the value of k, the key Key(k) can be obtained, and the original face image can be identified as F(k) and embedded in For the watermark value W(k) of F(k), the formula for calculating the normalized correlation coefficient of the feature vector is as follows:
5)利用存在于第三方的二值逻辑密钥序列Key(k)和待测人脸的特征向量V’,提取出待测图像中的水印W'(k);5) Utilize the binary logic key sequence Key(k) existing in the third party and the feature vector V' of the face to be tested to extract the watermark W'(k) in the image to be tested;
W'(k)=Key(k)⊕V'W'(k)=Key(k)⊕V'
6)计算W'和W(k)之间的相关系数;计算提取的水印和嵌入的水印的相关系数,并可以根据水印判别待测图像的内容。6) Calculate the correlation coefficient between W' and W(k); calculate the correlation coefficient between the extracted watermark and the embedded watermark, and judge the content of the image to be tested according to the watermark.
本发明与现有的人脸识别技术比较有以下优点:Compared with the existing face recognition technology, the present invention has the following advantages:
首先:较好的将水印的鲁棒性和不可见性与人脸的识别进行了有机的结合;利用水印的鲁棒性算法,实现了人脸算法的抗光照、遮罩、脸部扭曲等攻击,并且水印的嵌入不影响原始图像的像素值;其次:水印还可以保护个人的隐私,只有授权的用户才可以进行人脸的识别;最后,并且由于该人脸识别技术,不需要样本的学习,所以适合于大量的人脸识别,适合于大数据下人脸的识别。First of all: better organically combine the robustness and invisibility of the watermark with face recognition; use the robustness algorithm of the watermark to realize the anti-lighting, masking, face distortion, etc. of the face algorithm attack, and the embedding of the watermark does not affect the pixel value of the original image; secondly: the watermark can also protect the privacy of the individual, and only authorized users can perform face recognition; finally, and because of the face recognition technology, there is no need for samples Learning, so it is suitable for a large number of face recognition, suitable for face recognition under big data.
以下从理论基础和实验数据说明:The following is explained from the theoretical basis and experimental data:
1)离散余弦变换1) Discrete cosine transform
DCT用于图像编码是目前广泛使用的JPEG压缩和MPEG-1/2的标准。DCT是在最小均方差条件小得出的仅次于K-L变换的次最佳正交变换,是一种无损的酋变换。它运算速度快,精度高,以提取特征成分的能力和运算速度之间的最佳平衡而著称。The use of DCT in image coding is currently widely used in JPEG compression and MPEG-1/2 standards. DCT is the second best orthogonal transformation after the K-L transformation obtained under the minimum mean square error condition, and it is a lossless chief transformation. It has fast operation speed and high precision, and is famous for the best balance between the ability to extract feature components and operation speed.
二维离散余弦正变换(DCT)公式如下:The two-dimensional discrete cosine transform (DCT) formula is as follows:
u=0,1,…,M-1;v=0,1,…,N-1;u=0,1,...,M-1; v=0,1,...,N-1;
式中In the formula
二维离散余弦反变换(IDCT)公式如下:The two-dimensional inverse discrete cosine transform (IDCT) formula is as follows:
x=0,1,…,M-1;y=0,1,…,N-1x=0,1,...,M-1; y=0,1,...,N-1
其中x,y为空间域采样值;u,v为频率域采样值,通常数字图像用像素方阵表示,即M=NAmong them, x, y are sampling values in the space domain; u, v are sampling values in the frequency domain, and usually digital images are represented by a square matrix of pixels, that is, M=N
从上面的公式可知,DCT的系数符号是和分量的相位有关的。It can be seen from the above formula that the coefficient sign of DCT is related to the phase of the component.
2)人脸图像的一个鲁棒的视觉特征向量的选取方法2) A robust visual feature vector selection method for face images
目前大部分人脸识别算法对光照、遮罩、表情变化抗攻击能力较差的原因是当这些攻击实施是,在空间域下,像素值发生了较大变化,特别是室内外光照的影响;能否找到一个抗光照、遮罩等攻击的特征向量意义重大。如果能够找到一个反映人脸图像几何特点的特征向量,当人脸图像发生小的几何变换和光照变化时,该特征向量不会发生明显的突变,那么根据该特征向量,利用相关系数的最大值,我们求得相应的原始图像,和提取出对应的水印。At present, the reason why most face recognition algorithms have poor anti-attack ability to lighting, masking, and expression changes is that when these attacks are implemented, in the spatial domain, the pixel value changes greatly, especially the influence of indoor and outdoor lighting; It is of great significance to find a feature vector that is resistant to attacks such as lighting and masking. If it is possible to find an eigenvector that reflects the geometric characteristics of the face image, when the face image undergoes small geometric transformations and illumination changes, the eigenvector will not undergo significant mutations, then according to the eigenvector, use the maximum value of the correlation coefficient , we obtain the corresponding original image, and extract the corresponding watermark.
为此,选取一些光照攻击,遮罩攻击和滤波等常规攻击的实验数据见表1所示。表1中用作测试的原始图像是图1,是ORL人脸数据库的第一幅人脸,由剑桥大学AT&T实验室创建;表1中“第1列”显示的是人脸识别算法受到的攻击类型,受到不同强度的光照攻击后的该人脸图像见图2至图4,光照强度由小到大;遮挡攻击见图5至图7;包括,研究常见的眼镜遮挡、口罩遮挡和帽子遮挡;图8是挤压攻击,该攻击类似于表情变化攻击;高斯噪声、JPEG压缩、中值滤波等常规攻击见图9至图12。表1的“第2列”表示的是人脸图像受到攻击后的峰值信噪比(PSNR);表1的“第3列”到“第10列”,是DCT变换后的低频系数,这里选取“D(1,1)、D(1,2)、...D(2,4)”等八个低频变化域系数。表1的“第11列”是用于特征提取的符号序列。通过该表的数据我们发现,对于光照、遮罩局部扭曲等攻击,这些DCT变换域的低频值D(1,1)、D(2,4)等可能发生一些变换,但其系数符号仍然不变,我们将大于或等于0的系数,记为1;小于0的记为0,那么对于原始人脸数据来说,系数值D(1,1)、D(1,2)...D(2,4)等对应的符号二值序列为:“1100 0011”,见表1的第11列,观察该列可以发现,无论光照攻击,遮罩攻击,扭曲攻击还是常规攻击,其符号序列和原始数据的保持相似,并且与原始数据的符号序列归一化相关系数都较大,见表第12列。结果显示的相关系数都大于0.5,这是在低频系数取前64位符号序列求得的相关系数值。To this end, the experimental data of some conventional attacks such as light attack, mask attack and filtering are selected, as shown in Table 1. The original image used for testing in Table 1 is Figure 1, which is the first face in the ORL face database, created by the AT&T laboratory of the University of Cambridge; "Column 1" in Table 1 shows the face recognition algorithm subjected to Attack type, the face image after being attacked by different intensities of light is shown in Figure 2 to Figure 4, and the light intensity is from small to large; occlusion attack is shown in Figure 5 to Figure 7; including, research common glasses occlusion, mask occlusion and hat Occlusion; Figure 8 is a squeeze attack, which is similar to an expression change attack; conventional attacks such as Gaussian noise, JPEG compression, and median filtering are shown in Figures 9 to 12. "Column 2" of Table 1 indicates the peak signal-to-noise ratio (PSNR) of the face image after being attacked; "Column 3" to "Column 10" of Table 1 are low-frequency coefficients after DCT transformation, where Select eight low-frequency variation domain coefficients such as "D(1,1), D(1,2), ... D(2,4)". "Column 11" of Table 1 is the sequence of symbols used for feature extraction. Through the data in this table, we found that for attacks such as illumination and partial distortion of masks, the low-frequency values D(1,1), D(2,4) in the DCT transform domain may undergo some transformations, but the coefficient signs are still different. change, we record the coefficients greater than or equal to 0 as 1; those less than 0 as 0, then for the original face data, the coefficient values D(1,1), D(1,2)...D (2,4) and so on correspond to the symbol binary sequence: "1100 0011", see the 11th column of Table 1, observe this column, we can find that no matter the light attack, mask attack, distortion attack or conventional attack, the symbol sequence It is similar to that of the original data, and the normalized correlation coefficient of the symbol sequence of the original data is relatively large, as shown in column 12 of the table. The results show that the correlation coefficients are all greater than 0.5, which is the correlation coefficient value obtained by taking the first 64-bit symbol sequence of the low-frequency coefficients.
表1人脸图像DCT系数和部分系数受不同攻击后的变化值Table 1 The change value of DCT coefficients and some coefficients of face images after different attacks
*DCT数单位1.0e+002*DCT number unit 1.0e+002
为了进一步说明符号序列是人脸图像的一个特征向量,我们将不同的人脸图像求出其视觉特征向量,然后计算它们之间的相关系数;这里取ORL人脸数据库的前10个正常表情的人脸进行测试;图13-图22,从统计学角度,这里取了DCT域低频部分的前8×8个64个DCT系数。并且求出每个特征向量之间的相关系数,计算结果如表2所示。In order to further illustrate that the symbol sequence is a feature vector of a face image, we obtain the visual feature vectors of different face images, and then calculate the correlation coefficient between them; here we take the first 10 normal expressions of the ORL face database Faces are tested; Figure 13-Figure 22, from a statistical point of view, here are the first 8×8 64 DCT coefficients of the low-frequency part of the DCT domain. And calculate the correlation coefficient between each eigenvector, and the calculation results are shown in Table 2.
表2.10个不同人脸图像特征向量之间的相关系数(向量长度64bit)Table 2. Correlation coefficients between 10 different face image feature vectors (vector length 64bit)
从表2可以看出,首先,人脸图像自身之间的相关系数最大,为1.00;其次,不同人脸的图像特征的相关系数都不大于0.5;这与我们人眼实际观察到的相符合,这说明按该发明的方法提取的特征向量,反映了人脸的主要外形特征和主要轮廓,并且人脸外形越相似,特征向量的相似程度越高。It can be seen from Table 2 that, firstly, the correlation coefficient between the face images themselves is the largest, which is 1.00; secondly, the correlation coefficients of the image features of different faces are not greater than 0.5; this is consistent with what we actually observe with the human eye , which shows that the feature vectors extracted by the method of the invention reflect the main appearance features and main contours of the human face, and the more similar the appearance of the faces, the higher the similarity of the feature vectors.
3)特征向量的长度与人脸算法的鲁棒性的关系3) The relationship between the length of the feature vector and the robustness of the face algorithm
根据人类视觉特性(HVS),低中频信号对人的视觉影响较大,对于二维图像是图像轮廓。因此,我们在对人脸图像选取适当变换系数时选取人脸图像的低中频系数,低中频系数的个数选择与进行全局DCT变换的原始人脸图像大小,以及一次性嵌入的水印的信息量和要求有关,选取的特征向量的长度L越小,一次性嵌入的信息量越少,但水印的鲁棒性越高。综合考虑后面的实验,我们在具体实验时选取L的长度为64。According to the characteristics of human vision (HVS), low-intermediate frequency signals have a greater impact on human vision, and for two-dimensional images, it is the image contour. Therefore, when we select the appropriate transformation coefficient for the face image, we select the low intermediate frequency coefficient of the face image, the number of low intermediate frequency coefficients is selected and the size of the original face image for global DCT transformation, and the amount of information of the one-time embedded watermark It is related to the requirements, the smaller the length L of the selected feature vector, the less the amount of information embedded at one time, but the higher the robustness of the watermark. Considering the following experiments comprehensively, we choose the length of L to be 64 in the specific experiment.
附图说明Description of drawings
图1是原始人脸图像。Figure 1 is the original face image.
图2是经过光照攻击后的人脸图像,光照强度为S。Figure 2 is the face image after the light attack, the light intensity is S.
图3是经过光照攻击后的人脸图像,光照强度为M。Figure 3 is the face image after the light attack, and the light intensity is M.
图4是经过光照攻击后的人脸图像,光照强度为L。Figure 4 is the face image after the light attack, and the light intensity is L.
图5是经过眼镜遮挡的人脸图像。Figure 5 is an image of a face covered by glasses.
图6是经过口罩遮挡的人脸图像。Figure 6 is a face image covered by a mask.
图7是经过帽子遮挡的人脸图像。Figure 7 is a face image covered by a hat.
图8是经过挤压的人脸图像。Figure 8 is a squeezed face image.
图9是经过高斯干扰的人脸图像,高斯强度为3%。Figure 9 is a face image after Gaussian interference, and the Gaussian intensity is 3%.
图10是经过高斯干扰的人脸图像,高斯强度为5%。Figure 10 is a face image after Gaussian interference, and the Gaussian intensity is 5%.
图11是经过JPEG压缩的人脸图像,压缩质量为5%。Figure 11 is a JPEG compressed face image with a compression quality of 5%.
图12是经过中值滤波的人脸图像,滤波参数为[3x3],滤波次数为20。Figure 12 is a face image after median filtering, the filtering parameters are [3x3], and the filtering times are 20.
图13ORL人脸数据库中的第1个人的人脸图像。Figure 13 The face image of the first person in the ORL face database.
图14ORL人脸数据库中的第2个人的人脸图像。Figure 14 The face image of the second person in the ORL face database.
图15ORL人脸数据库中的第3个人的人脸图像。Figure 15 The face image of the third person in the ORL face database.
图16ORL人脸数据库中的第4个人的人脸图像。Figure 16 The face image of the fourth person in the ORL face database.
图17ORL人脸数据库中的第5个人的人脸图像。Figure 17 The face image of the fifth person in the ORL face database.
图18ORL人脸数据库中的第6个人的人脸图像。Figure 18 The face image of the sixth person in the ORL face database.
图19ORL人脸数据库中的第7个人的人脸图像。Figure 19 The face image of the seventh person in the ORL face database.
图20ORL人脸数据库中的第8个人的人脸图像。Figure 20 The face image of the eighth person in the ORL face database.
图21ORL人脸数据库中的第9个人的人脸图像。Figure 21 The face image of the ninth person in the ORL face database.
图22ORL人脸数据库中的第10个人的人脸图像。Figure 22 The face image of the 10th person in the ORL face database.
图23待测的人脸图像,无干扰攻击。Figure 23 The face image to be tested, without interference attack.
图24无攻击时,检测到的原始图像。Figure 24 The original image detected when there is no attack.
图25无攻击时,提取出的水印。Figure 25 is the extracted watermark when there is no attack.
图26是光照强度为-100%的人脸图像。Fig. 26 is a face image with an illumination intensity of -100%.
图27光照强度为-100%时,检测到的原始人脸图像。图28光照强度是-100%提取出的水印。Fig. 27 When the light intensity is -100%, the detected original face image. Figure 28. Light intensity is -100% extracted watermark.
图29眼镜遮挡的人脸图像,遮挡大小为M。Figure 29 Face image occluded by glasses, the occlusion size is M.
图30眼镜遮挡时,检测到的人脸图像。Figure 30 The detected face image when the glasses are blocked.
图31眼镜遮挡时,提取的水印。Figure 31 The extracted watermark when the glasses are covered.
图32口罩遮挡的人脸图像,遮挡大小为M。Figure 32 Face image covered by a mask, the size of the block is M.
图33口罩遮挡是,检测到的人脸图像。Figure 33 Mask occlusion is the detected face image.
图34口罩遮挡时,提取的数字水印。Figure 34 The digital watermark extracted when the mask is occluded.
图35帽子遮挡的人脸图像,遮挡大小为M。Fig. 35 Face image occluded by a hat, the occlusion size is M.
图36帽子遮挡时,检测到的人脸图像。Figure 36 The detected face image when the hat is occluded.
图37帽子遮挡时,提取的数字水印。Figure 37 The extracted digital watermark when the hat is covered.
图38面部挤压的人脸图像,挤压强度为60%。Figure 38 Face image with face extrusion, extrusion intensity is 60%.
图39在挤压强度为60%时,识别的人脸图像。Figure 39 is the recognized face image when the squeeze strength is 60%.
图40在挤压强度为60%时,提取出的数字水印。Figure 40 is the extracted digital watermark when the extrusion intensity is 60%.
图41球面扭曲的人脸图像,扭曲数量为40%。Figure 41 Spherically distorted face image with a distortion amount of 40%.
图42在球面扭曲数量为40%时,检测到的人脸图像。Figure 42 is the detected face image when the amount of spherical distortion is 40%.
图43在球面扭曲数量为40%时,提取的水印。Figure 43 is the extracted watermark when the amount of spherical distortion is 40%.
图44高斯噪声攻击的人脸图像,高斯噪声强度为5%。Figure 44 Face image attacked by Gaussian noise, Gaussian noise intensity is 5%.
图45在高斯噪声强度为5%,识别到的人脸图像。Figure 45 is the recognized face image when the Gaussian noise intensity is 5%.
图46在高斯噪声强度5%,提取的水印。Figure 46. Extracted watermark at 5% Gaussian noise intensity.
图47JPEG压缩的人脸图像,压缩质量为5%。Figure 47 JPEG compressed face image, the compression quality is 5%.
图48在JPEG压缩为5%是,识别的原始图像。Figure 48 is the original image identified at a JPEG compression of 5%.
图49在JPEG压缩为5%时,提取的水印信息。Figure 49 extracts watermark information when JPEG compression is 5%.
图50中值滤波的人脸图像,滤波参数为:[3x3],滤波次数为10。Figure 50 is the face image of the median filter, the filter parameters are: [3x3], and the number of filters is 10.
图51在中值滤波为[3x3],检测到的原始图像。Figure 51 After median filtering for [3x3], the detected original image.
图52在中值滤波参数[3x3],提取的水印。Figure 52. Extracted watermark with median filter parameters [3x3].
具体实施方式Detailed ways
下面结合附图对本发明作进一步说明,仿真平台为Matlab2010a,产生1000组独立的二值伪随机序列(取值+1或0),每组序列长度为64bit,把这1000组数据对应1000个数字水印,W(n)。每个水印对应着一个原始图像,这里设第500组水印对应ORL的第一幅图像,见图1,其大小为92x112,该图在此作为作为原始图像和受到零攻击的测试图像。Below in conjunction with accompanying drawing, the present invention is further described, simulation platform is Matlab2010a, produces 1000 groups of independent binary pseudo-random sequences (value+1 or 0), each group of sequence length is 64bit, these 1000 groups of data are corresponding 1000 numbers Watermark, W(n). Each watermark corresponds to an original image. Here, the 500th group of watermarks corresponds to the first image of ORL, as shown in Figure 1. Its size is 92x112. This image is used here as an original image and a test image subject to zero attack.
为了测试抗光照、遮罩攻击的实验方便,再生成另外的1000组二值随机序列(取值为+1,或0),每组序列长度为64bit,这1000组作为1000个原始图像的特征向量,V(n);将第500个单元存放ORL人脸库中的第一幅人脸图的原始特征向量;In order to test the convenience of anti-illumination and mask attack experiments, another 1000 sets of binary random sequences (value +1, or 0), each set of sequence length is 64bit, and these 1000 sets are used as the features of 1000 original images Vector, V (n); The 500th unit is stored in the original feature vector of the first face figure in the ORL face storehouse;
其基本思路是,设F’是一个没有干扰时的待测人脸图像,见图23,求出其特征向量V',然后,通过求V'和所有原始图像的V(n)的相关系数,求出其最大值;然后确定对应的序号k,使得当n=k时,V'和V(k)的相关系数最大,根据序号k值,求得识别的原始图像F(k),和对应原始图像F(k)的嵌入的水印W(k)和密钥Key(k),其中Key(k)=W(k)⊕V(k);根据V'和Key(k),求出待测图像F'里的水印信息W’,W'=V'⊕Key(k),并且求出W和W’的相关系数,根据NC值得大小来来确定水印的相关程度和待测图像的所有者。The basic idea is, let F' be a face image to be tested without interference, see Figure 23, find its feature vector V', and then, by finding the correlation coefficient between V' and V(n) of all original images , find its maximum value; then determine the corresponding serial number k, so that when n=k, the correlation coefficient of V' and V(k) is the largest, according to the serial number k value, obtain the original image F(k) of recognition, and The embedded watermark W(k) and key Key(k) corresponding to the original image F(k), where Key(k)=W(k)⊕V(k); according to V' and Key(k), find The watermark information W' in the image F' to be tested, W'=V'⊕Key(k), and the correlation coefficient between W and W' is calculated, and the degree of correlation between the watermark and the image to be tested is determined according to the value of NC. owner.
图23是不加干扰时的待测人脸图像;Figure 23 is the face image to be tested when no interference is added;
图24是检测到的原始人脸图像;Fig. 24 is the detected original face image;
图25是提取的水印,可以看到NC=1.00,可以准确提取水印。Figure 25 is the extracted watermark, it can be seen that NC=1.00, the watermark can be extracted accurately.
下面我们通过具体实验来判断该基于鲁棒水印的人脸识别算法抗光照、遮挡和常规攻击等能力。Next, we use specific experiments to judge the ability of the robust watermark-based face recognition algorithm to resist light, occlusion and conventional attacks.
先测试该人脸识别算法抗光照、遮挡和扭曲攻击。First test the face recognition algorithm against illumination, occlusion and distortion attacks.
(1)光照攻击实验(1) Light attack experiment
表3是抗光照攻击的实验数据。从中可以看到,当待测图像减少光照强度,光照强度为-100%时,待测图像的信噪比为7.21dB,通过求特征向量的相关系数最大值,正确检测到对应的原始图像,并可以准确提取出数字水印,相关系数NC=0.81;而采用google的以图搜图功能,当待测图像,光照强度为-100%时,无法搜索到正确的原始图像。从表3可以看到,当光照强度为100%时,这时待测图像的信噪比为9.34dB,仍可以检测到正确的原始图像和提取出水印,水印相关系数为0.94;说明该基于水印的人脸识别算法有较好的抗光照攻击能力。Table 3 is the experimental data of anti-light attack. It can be seen that when the light intensity of the image to be tested is reduced and the light intensity is -100%, the signal-to-noise ratio of the image to be tested is 7.21dB. By finding the maximum value of the correlation coefficient of the eigenvector, the corresponding original image is correctly detected. And the digital watermark can be extracted accurately, the correlation coefficient NC=0.81; while using the image search function of Google, when the light intensity of the image to be tested is -100%, the correct original image cannot be searched. It can be seen from Table 3 that when the light intensity is 100%, the signal-to-noise ratio of the image to be tested is 9.34dB, and the correct original image and watermark can still be detected, and the watermark correlation coefficient is 0.94; The face recognition algorithm of the watermark has a good ability to resist light attack.
图26是光照强度为-100%的待测图像;视觉上图像较暗,信噪比PSNR为7.21dB;Figure 26 is an image to be tested with an illumination intensity of -100%; the image is visually darker, and the signal-to-noise ratio (PSNR) is 7.21dB;
图27是识别到的人脸图像,该图的特征向量与待测图像的特征向量相关系数为最大值;Fig. 27 is the recognized face image, and the correlation coefficient between the eigenvector of this figure and the eigenvector of the image to be tested is the maximum value;
图28是提取的水印,NC=0.81,很容易提取出水印。Figure 28 is the extracted watermark, NC=0.81, it is easy to extract the watermark.
表3抗光照攻击实验数据Table 3 Anti-light attack experimental data
(2)遮挡攻击实验(2) Blocking attack experiment
遮挡是人脸识别过程中,难以解决的问题,但基于鲁棒水印的人脸识别,利用鲁棒的水印算法,较好的解决了这个问题。表4是抗遮挡攻击的实验数据。包括眼镜遮挡,口罩遮挡和帽子遮挡;表中,S,M,L分别表示遮挡的面积的相对大小;从表4中可以看到,当眼镜遮挡较多时,遮挡大小为L,遮挡图像的PSNR=13.30dB,信噪比较低,但仍然可以正确识别原始图像,并提取出水印,NC=0.62;当口罩遮挡较多,遮挡大小为L时,遮挡图像的PSNR=16.20dB,仍可以提取出水印,NC=0.59;当帽子遮挡,遮挡面积较大,为L时,这时信噪比为PSNR=10.38dB,仍可以提取水印,NC=0.56Occlusion is a difficult problem in the process of face recognition, but face recognition based on robust watermarking, using a robust watermarking algorithm, can better solve this problem. Table 4 is the experimental data of anti-occlusion attack. Including glasses occlusion, mask occlusion and hat occlusion; in the table, S, M, and L represent the relative size of the occluded area; as can be seen from Table 4, when the glasses occlude more, the occlusion size is L, and the PSNR of the occluded image = 13.30dB, the signal-to-noise ratio is low, but the original image can still be correctly identified and the watermark extracted, NC = 0.62; when the mask occludes a lot and the occlusion size is L, the PSNR of the occluded image is 16.20dB, and the watermark can still be extracted Out of the watermark, NC=0.59; when the hat is covered and the occlusion area is large, L, then the signal-to-noise ratio is PSNR=10.38dB, and the watermark can still be extracted, NC=0.56
图29是眼镜遮挡,遮挡大小为M的待测图像;这时已有一定的遮挡效果,信噪比PSNR为14.78dB;Figure 29 is glasses occlusion, the image to be tested with an occlusion size of M; at this time, there is a certain occlusion effect, and the signal-to-noise ratio PSNR is 14.78dB;
图30是检测到的原始人脸图像;可正确识别对应的原始图像;Figure 30 is the detected original face image; the corresponding original image can be correctly identified;
图31是提取的水印,NC=0.75,可以正确的提取出水印。Figure 31 is the extracted watermark, NC=0.75, the watermark can be extracted correctly.
图32是口罩遮挡,遮挡大小为M,这时遮挡效果明显,信噪比较低,PSNR为17.31dB;Figure 32 is mask occlusion, the occlusion size is M, at this time the occlusion effect is obvious, the signal-to-noise ratio is low, and the PSNR is 17.31dB;
图33是识别的原始图像,可以看出可以正确识别出原始图像;Figure 33 is the original image identified, it can be seen that the original image can be correctly identified;
图34是提取的水印,NC=0.78,可正确提取出待测图像的水印。Figure 34 is the extracted watermark, NC=0.78, the watermark of the image to be tested can be correctly extracted.
图35是帽子遮挡,遮挡大小为M的待测图像;这时遮挡效果明显,信噪比PSNR为10.64dB;Figure 35 is a hat occlusion, the image to be tested with an occlusion size of M; at this time, the occlusion effect is obvious, and the signal-to-noise ratio PSNR is 10.64dB;
图36是识别的人脸图像;可以正确识别对应的原始图像;Figure 36 is a recognized face image; the corresponding original image can be correctly identified;
图37是提取的水印,NC=0.62,很容易检测到水印。Figure 37 is the extracted watermark, NC=0.62, it is easy to detect the watermark.
表4抗遮挡攻击Table 4 Anti-occlusion attack
(3)脸部挤压攻击实验(3) Face squeeze attack experiment
表5是抗脸部挤压攻击的实验数据,有时表情的变化可以反映在面部的挤压。从中可以看到,当待测图像面部挤压程度较大,挤压数量为100%时,这时图像的信噪比较低为16.60dB,但仍然可以检测到原始图像和提取出水印,NC=0.59;Table 5 is the experimental data of anti-face extrusion attack, sometimes the change of expression can be reflected in the extrusion of the face. It can be seen from the figure that when the face extrusion degree of the image to be tested is large and the extrusion amount is 100%, the signal-to-noise ratio of the image is as low as 16.60dB, but the original image can still be detected and the watermark extracted, NC =0.59;
图38是挤压强度为60%的待测图像;面部表情变化已较明显,信噪比为18.12dB;Figure 38 is an image to be tested with a squeeze intensity of 60%; the facial expression has changed significantly, and the signal-to-noise ratio is 18.12dB;
图39是识别到的人脸图像,可以正确识别到人脸图像;Fig. 39 is the recognized face image, which can correctly identify the face image;
图40是提取的水印,NC=0.81,很容易检测到水印。Figure 40 is the extracted watermark, NC=0.81, it is easy to detect the watermark.
表5脸部挤压攻击Table 5 Face squeeze attack
(4)球面扭曲攻击(4) Spherical Distortion Attack
表6是水印算法抗脸部球面扭曲攻击的实验数据。从表中可以看到,当待测图像球面扭曲较大,扭曲数量为60%时,这时待测图像的信噪比较低为17.61dB,但仍然可以检测到原始图像,并且可以提取出水印,NC=0.53;Table 6 is the experimental data of watermarking algorithm against face spherical distortion attack. It can be seen from the table that when the spherical distortion of the image to be tested is large and the amount of distortion is 60%, the signal-to-noise ratio of the image to be tested is as low as 17.61dB, but the original image can still be detected and extracted watermark, nc = 0.53;
图41是球面扭曲攻击,扭曲数量为40%的待测图像;面部的变形已较明显,信噪比为18.68dB;Figure 41 is a spherical distortion attack, the image to be tested with a distortion amount of 40%; the deformation of the face is obvious, and the signal-to-noise ratio is 18.68dB;
图42是识别到的人脸图像,可以检测到原始人脸;Figure 42 is a recognized face image, which can detect the original face;
图43是提取的水印,NC=0.62,可正确提取出水印。Figure 43 is the extracted watermark, NC=0.62, the watermark can be extracted correctly.
表6球面扭曲攻击Table 6 Spherical Distortion Attacks
上述主要对光照、遮挡等攻击进行了实验,下面对滤波等常规攻击进行测试;The above experiments mainly carried out experiments on attacks such as lighting and occlusion, and the following tests are performed on conventional attacks such as filtering;
(1)噪声攻击实验(1) Noise attack experiment
使用imnoise()函数在待测图像中加入高斯噪声。Use the imnoise() function to add Gaussian noise to the image under test.
表7是抗高斯噪声干扰的实验数据。从中可以看到,当待测图像高斯噪声强度高达30%时,待测图像的PSNR降至7.94dB,这时待测图像的质量较差;仍可以正确检测到原始图像,可以提取出水印,NC=0.60。而使用google的以图搜图功能,当待测图像的高斯噪声强度仅为5%时,就无法进行正常的原始图像的识别。这说明采用该发明有好的抗高斯噪声能力。Table 7 is the experimental data of anti-Gaussian noise interference. It can be seen that when the Gaussian noise intensity of the image to be tested is as high as 30%, the PSNR of the image to be tested drops to 7.94dB. At this time, the quality of the image to be tested is poor; the original image can still be detected correctly, and the watermark can be extracted. NC = 0.60. However, using Google's image search function, when the Gaussian noise intensity of the image to be tested is only 5%, it is impossible to recognize the normal original image. This shows that the invention has a good anti-Gaussian noise capability.
图44是高斯噪声强度5%的待测图像,在视觉上已很模糊,PSNR=12.98dB;Figure 44 is the image under test with 5% Gaussian noise intensity, which is visually blurred, PSNR=12.98dB;
图45是识别到的人脸原始图像,可以正确识别;Figure 45 is the original image of the recognized face, which can be correctly identified;
图46是提取的水印,能准确得提取水印,NC=0.81。Figure 46 is the extracted watermark, the watermark can be extracted accurately, NC=0.81.
表7抗高斯干扰Table 7 Anti-Gaussian interference
(2)JPEG压缩攻击实验(2) JPEG compression attack experiment
采用图像压缩质量百分数作为参数对待测图像进行据进行JPEG压缩;表8为待测图像JPEG压缩实验数据。当压缩质量仅为2%,这时压缩质量较低,PSNR=22.21dB,仍然可以提取出水印,NC=0.75。The image compression quality percentage is used as a parameter to perform JPEG compression on the image to be tested; Table 8 shows the experimental data of JPEG compression on the image to be tested. When the compression quality is only 2%, the compression quality is relatively low, PSNR=22.21dB, the watermark can still be extracted, NC=0.75.
图47是压缩质量为5%的待测图像,该图已经出现方块效应,Figure 47 is the image to be tested with a compression quality of 5%, and the block effect has appeared in this picture.
PSNR=25.12dB;PSNR = 25.12dB;
图48是识别的原始图像,可以正确识别;Figure 48 is the recognized original image, which can be correctly recognized;
图49是在待测图像中提取的水印,NC=0.90,可以准确提取水印。Figure 49 is the watermark extracted from the image to be tested, NC=0.90, the watermark can be extracted accurately.
表8JPEG攻击实验Table 8 JPEG attack experiment
(3)中值滤波攻击实验(3) Median filter attack experiment
表9为抗中值滤波攻击实验,从表中看出,当中值滤波参数为[7x7],滤波重复次数为10时,图像的信噪比较低PSNR=20.92dB,但仍然可以测得水印的存在,NC=0.87。Table 9 shows the anti-median filter attack experiment. It can be seen from the table that when the median filter parameter is [7x7] and the number of filter repetitions is 10, the signal-to-noise ratio of the image is low PSNR=20.92dB, but the watermark can still be measured The presence of , NC = 0.87.
图50是中值滤波参数为[3x3],滤波重复次数为10的待测图像,图像已出现模糊,PSNR=29.18dB;Figure 50 is the image to be tested with the median filtering parameter [3x3] and the number of filtering repetitions being 10. The image has been blurred, PSNR=29.18dB;
图51是在上述滤波的情况下,检测到的原始图像,这时可以正确的检测到原图像;Figure 51 is the detected original image in the case of the above filtering, and the original image can be correctly detected at this time;
图52是在待测图像中提取的水印,NC=0.96,可以准确提取水印。Figure 52 is the watermark extracted from the image to be tested, NC=0.96, the watermark can be extracted accurately.
表9中值滤波攻击实验Table 9 Median filtering attack experiment
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410229430.0A CN103984932A (en) | 2014-05-29 | 2014-05-29 | Anti-light face recognition method based on transform domain robust watermark under big data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410229430.0A CN103984932A (en) | 2014-05-29 | 2014-05-29 | Anti-light face recognition method based on transform domain robust watermark under big data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103984932A true CN103984932A (en) | 2014-08-13 |
Family
ID=51276894
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410229430.0A Pending CN103984932A (en) | 2014-05-29 | 2014-05-29 | Anti-light face recognition method based on transform domain robust watermark under big data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103984932A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111275602A (en) * | 2020-01-16 | 2020-06-12 | 深圳市广道高新技术股份有限公司 | Face image security protection method, system and storage medium |
CN118587568A (en) * | 2024-08-05 | 2024-09-03 | 齐鲁工业大学(山东省科学院) | Active deep fake forensics method based on separable-aware hash enhancement |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8064102B1 (en) * | 2010-07-01 | 2011-11-22 | Xerox Corporation | Embedding frequency modulation infrared watermark in digital document |
CN102314669A (en) * | 2011-09-13 | 2012-01-11 | 海南大学 | DCT (discrete cosine transform)-based anti-geometric-attack zero-digital-watermarking method for medical image |
CN102360486A (en) * | 2011-09-13 | 2012-02-22 | 海南大学 | Medical-image robust multiple-watermark method based on DWT (Discrete Wavelet Transform) and DCT (Discrete Cosine Transform) |
CN102510490A (en) * | 2011-09-13 | 2012-06-20 | 海南大学 | Video watermark realizing method against geometric attack based on three-dimensional discrete cosine transform (DCT) |
CN102930500A (en) * | 2012-11-19 | 2013-02-13 | 海南大学 | Medical image robust watermarking method based on Arnold scrambling transformation and DCT (discrete cosine transformation) |
CN103177452A (en) * | 2013-04-19 | 2013-06-26 | 海南大学 | Intelligent texture anti-counterfeiting method based on DWT-DCT (Dreamweaver Template-Discrete Cosine Transform) transformation |
CN103279918A (en) * | 2013-06-20 | 2013-09-04 | 海南大学 | Volume data watermark realizing method based on three-dimension DCT and chaotic scrambling |
CN103794217A (en) * | 2014-01-16 | 2014-05-14 | 江苏科技大学 | Active sonar identity reorganization method based on watermark |
-
2014
- 2014-05-29 CN CN201410229430.0A patent/CN103984932A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8064102B1 (en) * | 2010-07-01 | 2011-11-22 | Xerox Corporation | Embedding frequency modulation infrared watermark in digital document |
CN102314669A (en) * | 2011-09-13 | 2012-01-11 | 海南大学 | DCT (discrete cosine transform)-based anti-geometric-attack zero-digital-watermarking method for medical image |
CN102360486A (en) * | 2011-09-13 | 2012-02-22 | 海南大学 | Medical-image robust multiple-watermark method based on DWT (Discrete Wavelet Transform) and DCT (Discrete Cosine Transform) |
CN102510490A (en) * | 2011-09-13 | 2012-06-20 | 海南大学 | Video watermark realizing method against geometric attack based on three-dimensional discrete cosine transform (DCT) |
CN102930500A (en) * | 2012-11-19 | 2013-02-13 | 海南大学 | Medical image robust watermarking method based on Arnold scrambling transformation and DCT (discrete cosine transformation) |
CN103177452A (en) * | 2013-04-19 | 2013-06-26 | 海南大学 | Intelligent texture anti-counterfeiting method based on DWT-DCT (Dreamweaver Template-Discrete Cosine Transform) transformation |
CN103279918A (en) * | 2013-06-20 | 2013-09-04 | 海南大学 | Volume data watermark realizing method based on three-dimension DCT and chaotic scrambling |
CN103794217A (en) * | 2014-01-16 | 2014-05-14 | 江苏科技大学 | Active sonar identity reorganization method based on watermark |
Non-Patent Citations (1)
Title |
---|
隋淼等: ""一种基于Arnold置乱变换和DCT的医学图像鲁棒水印算法"", 《计算机应用研究》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111275602A (en) * | 2020-01-16 | 2020-06-12 | 深圳市广道高新技术股份有限公司 | Face image security protection method, system and storage medium |
CN111275602B (en) * | 2020-01-16 | 2023-06-30 | 深圳市广道数字技术股份有限公司 | Face image security protection method, system and storage medium |
CN118587568A (en) * | 2024-08-05 | 2024-09-03 | 齐鲁工业大学(山东省科学院) | Active deep fake forensics method based on separable-aware hash enhancement |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cheema et al. | A novel optimized semi-blind scheme for color image watermarking | |
Bravo-Solorio et al. | Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics | |
Dixit et al. | Blur‐invariant copy‐move forgery detection technique with improved detection accuracy utilising SWT‐SVD | |
Bhatnagar et al. | Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform | |
Zimba et al. | DWT-PCA (EVD) based copy-move image forgery detection | |
CN106023056B (en) | Zero watermarking insertion, extracting method and the device compressed based on DWT and principal component analysis | |
CN108876696A (en) | A kind of medical image robust watermarking method based on SIFT-DCT | |
CN108776790A (en) | Face encryption recognition methods based on neural network under cloud environment | |
CN101246588B (en) | Self-adapting watermarking algorithm of colorful image hypercomplex number spacing | |
Liu et al. | Robust blind image watermarking based on chaotic mixtures | |
CN103279918A (en) | Volume data watermark realizing method based on three-dimension DCT and chaotic scrambling | |
Hou et al. | Detection of hue modification using photo response nonuniformity | |
CN102521821A (en) | Automatic identification and tampered area positioning method in digital image | |
Maind et al. | Image copy move forgery detection using block representing method | |
CN110517181A (en) | Medical image zero watermark embedding method based on Hough combination transform | |
Zhu et al. | Remote sensing image watermarking based on motion blur degeneration and restoration model | |
Hua et al. | A hybrid NSCT domain image watermarking scheme | |
CN104021567A (en) | Gaussian Blurred Image Tampering Detection Method Based on First Number Law | |
Isaac et al. | Copy-Move forgery detection based on Harris Corner points and BRISK | |
Bhattacharyya et al. | DCT difference modulation (DCTDM) image steganography | |
CN106097236B (en) | Frequency domain robust image reversible water mark method based on Non-negative Matrix Factorization | |
CN103984932A (en) | Anti-light face recognition method based on transform domain robust watermark under big data | |
Elahian et al. | Improved robust DWT-watermarking in YCbCr color space | |
CN116342358A (en) | Medical image robust watermarking method based on K-means and DCT | |
CN103984933A (en) | Anti-occlusion face recognition method based on DWT-DCT watermark under big data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140813 |