Safe and active image tampering detection method and device

An active, image technology, applied in the direction of image communication, electrical components, transmission systems, etc., can solve the problem that the receiving end device cannot detect that the original image has been tampered with, cannot accurately detect whether the image has been tampered with, and erroneous detection results. Guarantee image integrity and image authenticity, ensure image authenticity, and avoid the effect of detection results

Active Publication Date: 2015-09-23
BEIJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Obviously, the original image has been tampered with in the above process, but the receiver device cannot detect that the original image has been tampered with, resulting in wrong detection results and cannot accurately detect whether the image has been tampered with

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe and active image tampering detection method and device
  • Safe and active image tampering detection method and device
  • Safe and active image tampering detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] Aiming at the problems existing in the prior art, Embodiment 1 of the present invention proposes a safe active image tampering detection method, which is applied to a system including a sending-end device and a receiving-end device. Wherein, the sending-end device refers to a device that sends an image, and the receiving-end device refers to a device that receives an image and performs an integrity check on the image. In a specific application scenario, the sending end device may be a terminal device, and the receiving end device may be an application server. The images referred to in the embodiments of the present invention specifically include but are not limited to images generated by sensing applications of terminal devices, for example, reporting images generated by environmental pollution reporting applications, management images generated by public place management applications, and taking pictures of emergencies Photo images produced by forensic applications, et...

Embodiment 2

[0070] Embodiment 2 of the present invention proposes a safe active image tampering detection method, which can be applied to a system including a sending-end device and a receiving-end device. Wherein, the sending-end device refers to a device that sends an image, and the receiving-end device refers to a device that receives an image and performs an integrity check on the image. In a specific application scenario, the sending end device may be a terminal device, and the receiving end device may be an application server.

[0071] The images referred to in the embodiments of the present invention specifically include but are not limited to images generated by sensing applications of terminal devices, for example, reporting images generated by environmental pollution reporting applications, management images generated by public place management applications, and taking pictures of emergencies Photo images produced by forensic applications, etc.

[0072] It should be noted that ...

Embodiment 3

[0100] Embodiment 3 of the present invention proposes a safe active image tampering detection method, which can be applied to a system including a sending end device and a receiving end device. Wherein, the sending-end device refers to a device that sends an image, and the receiving-end device refers to a device that receives an image and performs an integrity check on the image. In a specific application scenario, the sending end device may be a terminal device, and the receiving end device may be an application server.

[0101] The images referred to in the embodiments of the present invention specifically include but are not limited to images generated by sensing applications of terminal devices, for example, reporting images generated by environmental pollution reporting applications, management images generated by public place management applications, and taking pictures of emergencies Photo images produced by forensic applications, etc.

[0102] It should be noted that ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention discloses a safe and active image tampering detection method and device. The method comprises: sending end equipment obtaining a first image, generating a random value of which the length is a second numerical value, obtaining a pre-configured fixed value of which the length is a third numerical value, and using the random value and the fixed value for generating a specified type character string of which the length is a first numerical value; performing Hash operation on the first image and the specified type character string by using an information digest algorithm to obtain a first information digest value; performing encryption processing on the specified type character string by using an encryption algorithm to obtain an encrypted specified type character string; adding the first information digest value and the encrypted specified type character string to the first image for obtaining a second image; sending the second image to receiving end equipment; and the receiving end equipment using the first information digest value and the encrypted specified type character string for detecting whether the first image is tampered or not. In the embodiment of the present invention, the image integrity and the image authenticity in the process of obtaining evidence for the images are ensured.

Description

technical field [0001] The invention relates to the technical field of computer applications, in particular to a safe active image tampering detection method and device. Background technique [0002] In order to detect whether the image has been tampered with during the forensics process, the sending device and the receiving device will agree on the same information digest algorithm, such as MAC (Message Authentication Code, message authentication code) algorithm. Before sending the original image, the sending device uses the MAC algorithm to perform Hash operation on the original image to obtain the first information summary value, and sends the first information summary value and the original image to the receiving device. After receiving the first information digest value and the original image, the receiver device uses the same MAC algorithm to perform Hash operation on the original image to obtain the second information digest value. If the first information digest val...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/32H04L29/06
CPCH04L63/04H04N1/32272
Inventor 赵东马华东陈建伟李天元
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products