Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image encoding method for preventing and identifying image tamper

An image coding and coding technology, applied in image communication, image data processing, image data processing, etc., can solve problems such as difficulty, not allowing images, and generating noise, and achieve the effect of ensuring security and authenticity and preventing malicious tampering.

Inactive Publication Date: 2009-04-15
陈诚
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with digital watermarking, this method does not require any operation on the original image, but because digital images usually generate noise in the process of digitizing continuous images, and the process of image compression is usually lossy compression, it will also change Statistical characteristics of images, compression methods are also various, such as the previous JPEG using discrete cosine (DCT) transform and JPEG2000 using wavelet transform, different compression methods lead to changes in image statistical characteristics are not the same, therefore, resulting in statistical characteristics There are many reasons for the change, and it is very difficult to detect tampering with complete accuracy
In addition, this method can only detect image tampering, but cannot restore the tampered image to the original image
[0005] In addition to the inability to accurately restore the original image, the above two methods have a common disadvantage that some acceptable operations on the image are usually not allowed, such as brightness adjustment, contrast adjustment and other operations that do not change the image content, because these operations are Will be regarded as tampering with the image, but often these common operations are necessary

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encoding method for preventing and identifying image tamper
  • Image encoding method for preventing and identifying image tamper
  • Image encoding method for preventing and identifying image tamper

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0022] An image encoding method for preventing and identifying image tampering, comprising the following steps:

[0023] 1. Encrypted original image encoding:

[0024] Such as figure 2 To generate the encoded file structure shown in the figure, firstly, the encoding of the displayed image must be completed. The encoding of the displayed image can be encoded in any format, such as BMP, JPEG, JPEG2000, PNG, RAW, etc., and then set the start identifier of the encrypted data. As a starting sign for decoding encrypted data, the sign can be defined by characters composed of multiple bytes, such as defining 4 bytes in C++ language (hereinafter, C++ language is used to represent the operation of data) and performing the following arrangement : BYTE(19), BYTE(82), BYTE(11), BYTE(24). When setting the first encoding, the display image is the original image, so the original image encoding is the same as the display image encoding, and the original image encoding uses the key K 1 Encr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an image coding method for preventing and identifying image tampering. The data of original image coding is encrypted by a key and circulating redundancy check coding (CRC) is carried out on the encrypted data; then scrambling encryption is carried out the encrypted data of the original image coding and the circulating redundancy check coding by keys; and then the encrypted data of the original image coding and the circulating redundancy check coding are added to display image coding (non-encrypted image coding), thereby preserving the information of the safe and true original image into the image so as to prevent and identify image tampering, in this way, the coding of one image consists of two parts: the display image coding and the encrypted original image coding; the display image coding can be any form of image compression coding and allows any form of operation on the display image; the original image can be intuitively observed by carrying out decryption on the encrypted original image coding; comparison is carried out on the original image and the display image, thus being capable of intuitively observing the alternation carried out on the original image. The image coding method has the advantage of identifying the image tampering in direct contrast with the original image, thus being convenient for people to judge whether the correction on the image affects the authenticity of the content of the image or not and being capable of accurately resuming the image after tampering to the original image. The image coding method is simple in arithmetic, is easy to realize hardware coding and software coding, can be used for validating the authenticity of court evidence and e-business pictures as well as resuming the tampered image and image steganalysis.

Description

Technical field: [0001] The invention relates to an image encoding method for preventing and identifying image tampering, which is used for digital image authentication, that is, verifying the authenticity of the digital image and restoring the tampered image to the original image. Background technique: [0002] In recent years, with the development of computer technology and image processing technology, especially some cutting-edge image processing software such as the powerful Photoshop image processing software produced by Adobe, it has become very easy to create fake images that are indistinguishable from real images , especially with the popularity of the Internet, a large number of forged images spread rapidly on the Internet, which has a serious impact on our society. In addition, in some applications such as news pictures, e-commerce pictures and court evidence pictures, people need to know exactly what Whether the pictures received or used are authentic and credible...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N5/913G06T1/00
Inventor 陈诚
Owner 陈诚
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products