Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Document authentication method based on interweaving watermark and biological characteristic

A biometric, authentication method technology, applied in the usage of multiple keys/algorithms, electrical components, digital transmission systems, etc., to achieve the effect of preventing denial behavior, accurate and complete

Inactive Publication Date: 2008-03-12
BEIJING JIAOTONG UNIV
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In general, the positioning accuracy of such methods is limited by the size of the packet or block and the length of the authentication code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Document authentication method based on interweaving watermark and biological characteristic
  • Document authentication method based on interweaving watermark and biological characteristic
  • Document authentication method based on interweaving watermark and biological characteristic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0045] FIG. 1 will take an image file as an example to explain the present invention in detail. The watermark embedding stage mainly includes the following four steps:

[0046] Step 1: Segmentation of image files

[0047] For an image I of size M×N, it is first divided into non-overlapping image blocks of size p×q. Therefore, the image contains M / p×N / q image blocks, and can be expressed by formula (2),

[0048] I={I x,y (t), 1≤x≤ M / p , 1≤y≤ N / p , 1≤t≤pq} (2)

[0049] Among them, x, y represent the position of the image block in the whole image, and t is used to mark a pixel in the image block.

[0050] Step 2: Construction of authentication code

[0051] In each image block, the authentication code is mainly obtained through some operation of the pixel values ​​of the current image block and its right adjacent block. The constructi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a document integrity authentication method based on an interleaving watermark and a biological feature, a chaos model is adopted to generate an authentication code, and the biological information of a deliverer is generated to a biological feature code streaming after being extracted through the feature. The authentication code and the biological feature code streaming are returned to the deliverer after a plurality of interleaving treatments under the control of a third party, and then the deliverer inserts the interleaving information in the document. When being authenticated, on the one hand, the extracted authentication code and a generated reference sequence are compared, the integrity of the document content is determined, and a tampered area is positioned; on the other hand, the extracted biological feature is identified, the identity of the deliverer is determined, and a disavowal behavior is prevented. The present invention can authenticate the integrality of the document, and can detect and position a tampered location. The different requirements of users to the precision are supported, and the positioning precision is adjustable and controllable. An authentication result is given by error, and the tampered location can be directly and visually reflected. The identity of the deliver can be determined, and the disavowal behavior is prevented.

Description

technical field [0001] The invention relates to a digital file integrity detection and authentication method, in particular to a file authentication method based on interlaced watermarks and biometric features, and belongs to the field of integrity authentication. Background technique [0002] With the development of computer and network technology, the trend of mutual promotion and interdependence between global economic integration and information networking is becoming more and more obvious. The expansion of the degree of network interconnection, the openness of the network and the sharing of resources have made information security, especially content security, increasingly prominent. The security of information content refers to the protection of information confidentiality, integrity, authenticity, availability, etc., to prevent attackers from taking advantage of system security loopholes to eavesdrop, impersonate, fraud, embezzle and other behaviors that harm the inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/00H04L9/14
Inventor 倪蓉蓉王艳霞阮秋琦
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products