A stealth method based on camera source anti-forensics
A source and camera technology, applied in the field of JPEG image concealment technology, can solve the problem of easy care and loss, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] The specific embodiments of the present invention will be described in detail below in conjunction with the technical solutions and accompanying drawings.
[0035] The present invention combines camera source anti-forensics with a secret algorithm, and the flow of the method is as follows: figure 1 shown.
[0036] This process is divided into two stages: in the first stage, the images used by Alice when sending messages to Bob are all from the source camera A in Alice’s hand, and the watchman Wendy can also obtain these images during the process of sending messages between the two, as time goes by Wendy has obtained enough images belonging to source camera A to build a matching model for source camera A. If Alice still uses the images of source camera A to transmit information at this time, it can be easily detected by Wendy. After discovering this situation, Alice established a mismatching scheme for the watchman's matching model. In order not to make Wendy suspicious...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


