Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method and device for image authentication

An image and authentication technology, applied in the field of image authentication, to achieve the effect of real-time detection, optimization of blind spots, and improvement of the level

Active Publication Date: 2020-06-09
GUANGDONG YOUMAI INFORMATION COMM TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to overcome the deficiencies of the prior art, one of the purposes of the present invention is to provide a method for image authentication, which can solve the problem of unlocking authentication based on image matching
[0007] The second object of the present invention is to provide a device for image authentication, which can solve the problem of unlock authentication based on image matching

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for image authentication
  • Method and device for image authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Below, in conjunction with accompanying drawing and specific embodiment, the present invention is described further:

[0051] Such as figure 1 As shown, the present invention provides a method for image authentication, comprising the following steps:

[0052] S1: Acquire matching images and image keys; before performing the program work of the present invention, an image needs to be set as the image key first, and the image format is the mainstream format png or jpg; the image can be stored in the computer or mobile terminal Locally, or it can be saved on the server or cloud, and the security of the transmission process and transmission channel needs to be ensured when saving on the server; when performing image authentication, you can call the system album or camera of the computer or mobile terminal to obtain the decrypted image The original image, the original image is the matching image mentioned in the embodiment of the present invention, the original image can be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an image authentication method and device, comprising the following steps: S1: acquiring a matching image and an image key; S2: converting both the matching image and the image key into a corresponding grayscale single-channel image; S3: Use the ORB feature extraction algorithm to extract and match the image features of the converted matching image and image key; S4: judge whether the ORB feature detection is passed, if yes, perform step S5, if not, decryption fails; S5: match Template matching is performed on the image and the image key. If the match is successful, the decryption is successful. If the match fails, the decryption fails. By combining ORB feature detection and template matching, the invention can optimize blind spots in image matching and improve the level of image comprehensive matching.

Description

technical field [0001] The invention belongs to the technical field of image processing, and in particular relates to an image authentication method and device. Background technique [0002] At present, in the software field, the encryption key carriers are mainly character strings such as numbers and letters, and the data and materials are encrypted or authenticated through character strings with various encryption algorithms to achieve the purpose of preventing confidentiality from being leaked. Some encryption devices can handle information security issues through external hardware devices such as USB shields and electronic code locks, or biometric features such as fingerprints and irises. Encryption using character strings as keys has a long history, and has the characteristics of various encryption methods, simplicity and convenience, and good encryption effects. However, simple character string passwords are easy to crack through credentialing, and complex character st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/36G06K9/46G06K9/62
CPCG06F21/36G06V10/462G06V10/751
Inventor 陈强何清亮
Owner GUANGDONG YOUMAI INFORMATION COMM TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More