Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authenticity self-identifying and tampering self-positioning method for digital image

A digital image, self-identification technology, applied in the field of computer application, computer security, image processing, can solve problems such as simple methods

Inactive Publication Date: 2011-04-27
TIANJIN UNIV OF TECH & EDUCATION TEACHER DEV CENT OF CHINA VOCATIONAL TRAINING & GUIDANCE
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there are some methods that can realize the tampering and positioning of images, but the methods are usually simple and easy to be used by attackers, resulting in the situation that after replacing the entire image information, it still passes the verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authenticity self-identifying and tampering self-positioning method for digital image
  • Authenticity self-identifying and tampering self-positioning method for digital image
  • Authenticity self-identifying and tampering self-positioning method for digital image

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0006] The specific implementation includes two processes. The first process is the information embedding process of embedding verification information into the image, and the second process is the verification process of realizing image authenticity identification and tampering self-location.

[0007] 1 Information embedding process

[0008] The specific steps of the information embedding process are as follows:

[0009] 1.1 Least Significant Position Zero

[0010] Suppose the original image O has a size of 256×256 pixels, and the least significant position of this image is zeroed to obtain image O1. For example, the pixel value of a block in the image O is which is Zero the least significant bits of all its bits, which is O 1 = 11111110 10000000 01101010 00100000 . ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authenticity self-identifying and tampering self-positioning method for a digital image, and belongs to the technical fields of image processing, computer security, computer application and the like. By the method, whether an authenticated image is substituted or tampered can be effectively judged, and a specific tampered position is pointed out according to an actual tampered condition. The digital image is processed through a hyper-chaotic cellular neural network and encrypted by a public key encryption system. The method can be widely applied to occasions with high image security requirements, such as medical treatment, military affairs, electronic commerce, electronic government affaires and the like.

Description

technical field [0001] The invention relates to image processing, computer security, computer application and other technical fields. Background technique [0002] The development of the Internet provides convenience for the dissemination of digital images. At the same time, with the improvement of digital image processing technology, the modification of digital images becomes more and more convenient. Some digital images have high security requirements, and any slight changes will affect the actual information to be represented, such as medical images, geographic information images in some military fields, etc., and these information do not want to be modified. When the receiver receives this kind of image information, he often hopes to be able to judge the image, whether the image is the original image, whether some pixels have been tampered with, and if tampered with, the tampered pixel can be located point. At present, there are some methods that can realize tampering ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T1/00
Inventor 李立宗高铁杠顾巧论杨群亭
Owner TIANJIN UNIV OF TECH & EDUCATION TEACHER DEV CENT OF CHINA VOCATIONAL TRAINING & GUIDANCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products