Unlock instant, AI-driven research and patent intelligence for your innovation.

Image authentication method based on feedback chaos system and neighborhood assistance

A chaotic system and image authentication technology, applied in image data processing, image data processing, instruments, etc., can solve the problems of expanding the scope of misjudgment, low positioning accuracy of tampering, and affecting detection accuracy, etc.

Inactive Publication Date: 2009-02-11
BEIJING JIAOTONG UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this scheme still uses digital signatures as authentication watermarks, which affects the accuracy of detection.
In addition, once a vector quantization attack occurs, the tampering can only be revealed and judged in the detection of higher layers
Since the size of the higher layer is 4 times that of the current image block, the scope of misjudgment is enlarged and the accuracy of tampering location is lower

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image authentication method based on feedback chaos system and neighborhood assistance
  • Image authentication method based on feedback chaos system and neighborhood assistance
  • Image authentication method based on feedback chaos system and neighborhood assistance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0045] As shown in Figure 1(a), the present invention mainly includes the following three steps in the watermark embedding stage:

[0046] Step 1: Image Segmentation

[0047] For an image I of size M×N, it is first divided into non-overlapping image blocks of size p×q. Therefore, the image contains M / p×N / q image blocks, and can be expressed by formula (2),

[0048] I={I x,y (t), 1≤x≤M / p, 1≤y≤N / q, 1≤t≤pq} (2)

[0049] Among them, x, y represent the position of the image block in the whole image, and t is used to mark a pixel in the image block.

[0050] Step 2: Construction of the Authentication Watermark

[0051]In each image block, the authentication watermark is mainly obtained by some operation of the pixel values ​​of the current image block and its right adjacent block. The construction process designs a feedback chaotic system. The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

It includes: (1) dividing picture into blocks at embedding stage and building relation between current picture block (CPB) and neighbor picture block (NPB); (2) designing authentication watermark (AW) structure means basis on feedback chaos system (FCS); (3) embedding AW into CPB lowest effective bit; (4) generating a reference series at authentication stage and comparing it with fetched watermark to obtain a error matrix (EM) according to comparing result. Advantages of this method are: (1) it supports user's different precision requests, because precision is adjustable / controllable. (2) Via neighbor domain assistant means, to build relation between CPB and NPB can defense attack of vector quantization. (3) FCS ensures each pixel to possess equal contribution and makes watermark code more reasonable / effective. (4) This verifying process is a blind one with neither original picture nor original watermark. (5) This authentication result is EM reflecting visually juggles positions.

Description

technical field [0001] The invention relates to a digital image integrity detection and authentication method, in particular to image authentication based on digital watermarking technology, and belongs to the technical field of digital watermarking. Background technique [0002] With the development of computer and network technology, the application of digital multimedia is becoming more and more popular. Digital multimedia has the advantages of copy invariance, convenient transmission, and easy operation. However, the use of digital works such as digital images also poses many problems. The lossless copy makes the copyright of the digital work infringed, and brings a lot of property loss to the copyright owner. Subtle tampering and stitching operations destroy the authenticity and integrity of digital works such as images. [0003] In recent years, digital watermarking technology provides technical support for solving these problems. This technology embeds a digital m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
Inventor 倪蓉蓉阮秋琦
Owner BEIJING JIAOTONG UNIV