Method and device for image authentication

An image and authentication technology, applied in the field of image authentication, to achieve the effect of improving the level, optimizing blind spots, and satisfying real-time detection

Active Publication Date: 2017-06-23
GUANGDONG YOUMAI INFORMATION COMM TECH
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to overcome the deficiencies of the prior art, one of the purposes of the present invention is to provide a method for image authentication, which can solve the problem of unlocking authentication based on image matching
[0007] The second object of the present invention is to provide a device for image authentication, which can solve the problem of unlock authentication based on image matching

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for image authentication
  • Method and device for image authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Below, in conjunction with accompanying drawing and specific embodiment, the present invention is described further:

[0051] like figure 1 As shown, the present invention provides a method for image authentication, comprising the following steps:

[0052] S1: Acquire matching images and image keys; before performing the program work of the present invention, an image needs to be set as the image key first, and the image format is the mainstream format png or jpg; the image can be stored in the computer or mobile terminal Locally, or it can be saved on the server or cloud, and the security of the transmission process and transmission channel needs to be ensured when saving on the server; when performing image authentication, you can call the system album or camera of the computer or mobile terminal to obtain the decrypted image The original image, the original image is the matching image mentioned in the embodiment of the present invention, the original image can be se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for image authentication. The method comprises the steps of 1, a matched image and an image secret key are obtained; S2, the matched image and the image secret key are converted into a corresponding gray scale single channel graph; S3, through an ORB characteristic extracting algorithm, extraction of image characteristics and matching are conducted on the converted matched image and image secret key; S4, whether an ORB characteristic detection is passed or not is judged, if yes, the step S5 is entered, and if not, matching fails; S5, template matching is conducted on the matched image and the image secret key, if matching succeeds, encoding succeeds, and if matching fails, encoding fails. According to the method and device for the image authentication, by combining the ORB characteristic detection and template matching, blind spots in image matching can be optimized, and the comprehensive image matching level can be improved.

Description

technical field [0001] The invention belongs to the technical field of image processing, and in particular relates to an image authentication method and device. Background technique [0002] At present, in the software field, the encryption key carriers are mainly character strings such as numbers and letters, and the data and materials are encrypted or authenticated through character strings with various encryption algorithms to achieve the purpose of preventing confidentiality from being leaked. Some encryption devices can handle information security issues through external hardware devices such as USB shields and electronic code locks, or biometric features such as fingerprints and irises. Encryption using character strings as keys has a long history, and has the characteristics of various encryption methods, simplicity and convenience, and good encryption effects. However, simple character string passwords are easy to crack through credentialing, and complex character st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36G06K9/46G06K9/62
CPCG06F21/36G06V10/462G06V10/751
Inventor 陈强何清亮
Owner GUANGDONG YOUMAI INFORMATION COMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products