Zernike moment based robust hashing image authentification method

A technology of image authentication and robust hashing, applied in instruments, character and pattern recognition, computer components, etc., can solve problems such as inapplicable images, unfeasible calculations, unpredictable information summaries, etc.

Inactive Publication Date: 2007-11-28
SUN YAT SEN UNIV
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The Hash function can mainly solve two problems: within a certain period of time, it is impossible to find the original message that generates a specific Hash value after the HASH operation; it is also impossible to find two different messages that generate the same Hash value after the Hash operation
[0040] (2) The information digest generated by the one-way hash function is unpredictable, and the message digest does not seem to have any relationship with the original data
Moreover, any small changes in the raw data can have a large impact on the generated information summaries
[0041] (3) It is irreversible, that is, it is completely infeasible to obtain any information of the original data through the generated message digest
Traditional cryptography-based signatures are sensitive to changes in every bit in the authentication information and are not suitable for images because image data allows content-preserving operations such as compression, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Zernike moment based robust hashing image authentification method
  • Zernike moment based robust hashing image authentification method
  • Zernike moment based robust hashing image authentification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] The method of the present invention will be further described below in conjunction with the accompanying drawings.

[0084] As shown in Figure 1, at first, before the image is transmitted or stored, the method of the present invention extracts the feature of the image (calculates the zernike moment of the image), then encrypts the zernike moment value to generate a hash sequence, as the basis for image authentication in the future . When image authentication is required, use the same method to extract the features of the image, encrypt and generate a hash sequence, compare the newly generated hash sequence with the original hash sequence stored or transmitted with the image, and calculate the Hamming distance between the two , if the Hamming distance between the two is lower than the set threshold, the image is considered to be authenticated, otherwise, the image is considered not to be authenticated.

[0085] The concrete steps of the inventive method are as follows: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a robustness harce image identification method based on Zernike matrix in the image identification technique field. The selection of the image character is the key procedure in the harce algorism. The invention regards Zernike matrix as the character of the image and identifies the image by getting the randomized image harce value and comparing with the image harce value among Zernike matrix. The method achieves the steady of harce algorism with the inalterability of Zernike, which provides the operation steady of rotating the image, compressing JPEG, increasing the noise and filtering, and can identify the malicious falsification.

Description

technical field [0001] The invention belongs to the technical field of digital image authentication, and in particular relates to a Zernike moment-based robust hash image authentication method. Background technique [0002] One of the important criteria of digital image signature technology is the robustness of the system. That is to say, in view of the particularity of digital images, the system is required to be able to make accurate judgments on malicious tampering, and also to be able to accept general changes in images, such as noise addition, geometric transformation, filtering, compression, etc. From the process analysis of image authentication, if the appropriate features can be extracted, the goal of the system can be achieved, and the existing complete system can be used to be more compatible with the system that has been put into use. At present, scholars from various countries have tried different image features, from low-level image features, such as color, tex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00
Inventor 刘红梅何妙谊黄继武
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products