Image authentication method based on feedback chaos system and neighborhood assistance
A chaotic system and image authentication technology, applied in image data processing, image data processing, instruments, etc., can solve the problems of expanding the scope of misjudgment, low positioning accuracy of tampering, and affecting detection accuracy, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.
[0045] As shown in Figure 1(a), the present invention mainly includes the following three steps in the watermark embedding stage:
[0046] Step 1: Image Segmentation
[0047] For an image I of size M×N, it is first divided into non-overlapping image blocks of size p×q. Therefore, the image contains M / p×N / q image blocks, and can be expressed by formula (2),
[0048] I={I x,y (t), 1≤x≤M / p, 1≤y≤N / q, 1≤t≤pq} (2)
[0049] Among them, x, y represent the position of the image block in the whole image, and t is used to mark a pixel in the image block.
[0050] Step 2: Construction of the Authentication Watermark
[0051]In each image block, the authentication watermark is mainly obtained by some operation of the pixel values of the current image block and its right adjacent block. The construction process designs a feedback chaotic system. The...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 