高级检索
    毕秀丽, 闫武庆, 邱雨檬, 肖斌, 李伟生, 马建峰. 基于Shamir秘密共享方案的文件图像篡改检测和修复方法[J]. 计算机研究与发展, 2022, 59(6): 1356-1369. DOI: 10.7544/issn1000-1239.20200995
    引用本文: 毕秀丽, 闫武庆, 邱雨檬, 肖斌, 李伟生, 马建峰. 基于Shamir秘密共享方案的文件图像篡改检测和修复方法[J]. 计算机研究与发展, 2022, 59(6): 1356-1369. DOI: 10.7544/issn1000-1239.20200995
    Bi Xiuli, Yan Wuqing, Qiu Yumeng, Xiao Bin, Li Weisheng, Ma Jianfeng. Shamir Secret Sharing Scheme Based Method of Tampering Detection and Recovery for Document Image[J]. Journal of Computer Research and Development, 2022, 59(6): 1356-1369. DOI: 10.7544/issn1000-1239.20200995
    Citation: Bi Xiuli, Yan Wuqing, Qiu Yumeng, Xiao Bin, Li Weisheng, Ma Jianfeng. Shamir Secret Sharing Scheme Based Method of Tampering Detection and Recovery for Document Image[J]. Journal of Computer Research and Development, 2022, 59(6): 1356-1369. DOI: 10.7544/issn1000-1239.20200995

    基于Shamir秘密共享方案的文件图像篡改检测和修复方法

    Shamir Secret Sharing Scheme Based Method of Tampering Detection and Recovery for Document Image

    • 摘要: 提出了一种新的基于Shamir秘密共享方案的文件图像篡改检测和修复方法,该方法包含篡改保护生成和篡改检测修复2个过程.在篡改保护生成过程中,为了提高已有文件图像篡改检测和修复方法的篡改检测正确率和修复效果,首先提出了基于权重的篡改检测信号生成方法,对每个非重叠2×3图像块提取图像块特征,再利用Shamir秘密共享方案将块特征和块内容序列值生成用于块篡改检测和修复的共享信息,最后将块共享信息构成的α通道与原始图像组成可移植网络图形格式(portable network graphic format, PNG)的文件图像.在篡改检测过程中,α通道提取的共享信号可以判断图像块是否被篡改,并可以通过Shamir秘密共享方案反向操作修复篡改图像块的内容.实验表明所提方法不仅具有良好的篡改检测和修复效果,同时具有良好的鲁棒性,能抵抗图像裁剪、噪声攻击.

       

      Abstract: An authentication based on Shamir secret sharing with tampering detection and data recovery capability for document images is proposed, which includes two processes: tampering protection generation, and tampering detection and recovery. In the process of tampering protection generation, in order to improve the tampering detection accuracy and recover effect of existing document images authentication methods, a method of tampering detection signal generation based on weight is proposed in this paper. Firstly, it extracts characteristics for each 2×3 non-overlapping block. After that, the block characteristics and block content are put into the Shamir secret sharing scheme to generate multiple shares for tampered blocks detection and repair. Finally, the shares of the block constitute the α channel plane and combine with the original image to form a PNG(portable network graphic format)image. During the authentication process, the authentication signal extracted from the shares in the α channel plane can determine whether the image block has been tampered with, and can repair the content of the tampered image block through the reverse operation of Shamir secret sharing scheme. Experiments show that the proposed method not only has good tamper detection and the effectiveness of data repair, but also has good robustness against image clipping and noise attack.

       

    /

    返回文章
    返回