Method for enhancing authenticity and expressiveness of hidden image decrypted in digital image

A digital image and authenticity technology, applied in image communication, image enhancement, image analysis, etc., can solve counterfeiting and other problems, achieve the effect of increasing real-time performance and reducing the possibility of being counterfeited

Inactive Publication Date: 2018-10-23
臧戈平
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] In the fourth type of technology, the recognition process of the app corresponding to the hidden picture or hidden code technology is to first take a picture, and then send the static picture back to the background for comparison with the networked background. However, this recognition method It is also easy to be counterfeited by counterfeit APPs through counterfeit background replacement of static images, overlapping of preset images inside counterfeit apps, and replacement of preset images inside counterfeit apps.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for enhancing authenticity and expressiveness of hidden image decrypted in digital image
  • Method for enhancing authenticity and expressiveness of hidden image decrypted in digital image
  • Method for enhancing authenticity and expressiveness of hidden image decrypted in digital image

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Through this embodiment, it is possible to understand the general process and difficulty of detecting a hidden image by a smart phone or a smart mobile device. Video is a series of discrete images with high acquisition frequency, so that visual persistence can be used to achieve visual continuity. Each discrete image is called a frame. Usually, the analytical interpretation of hidden images is done on a frame-by-frame basis.

[0047] The detection and decryption of the base map have specific requirements on the image quality of the captured or intercepted original image. Depending on the specific method of collecting pictures, the requirements are slightly different, but there are higher requirements for the focus and magnification of the shooting system.

[0048] Due to its high anti-counterfeiting and anti-copying functions, the technology of hiding images through the modulation of dot structure (for example: SI technology of Graphics Security System company, ICI tec...

Embodiment 2

[0087] The decryption of the base map in the Tibetan printed matter is completed by a decryption method corresponding to the Tibetan map method combined with a set of parameters, and the change of the parameters can affect the detection effect of the base map. For example: the most common image hiding method is to modulate the phase of periodic dots, and the base image of the printed matter after the image is hidden by this method can be detected by a frequency-matched grating film. The change in the angle of the grating sheet can cause changes in the density and direction of the interference fringes (moire) when the base image is displayed. The movement of the grating sheet can cause a phase change, thereby causing the movement effect of interference fringes (Moiré). A similar effect can also be obtained from the digital basemap image decrypted by the smart phone or smart mobile device APP of such printed matter, such as Figure 6 As shown, the method is to make correspondin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for enhancing the authenticity and expressiveness of a hidden image decrypted in a digital image, and relates to the technical field of information recognition and anti-counterfeiting of a smart phone or a smart mobile device. The method generates a series of decrypted base images by using a series of different hidden image decryption parameters for a single digitaltable image with a base image hidden, and uses the series of base image images to form an animated display. The method can greatly increase the timeliness, authenticity, transparency, certainty, livefeeling and expressiveness of detecting or reading of the base image, greatly reduce the possibility of counterfeiting of reading APP of printed matters and smart phones or smart mobile devices containing the hidden image, better guarantee the functions of scanning images, scanning anti-counterfeiting traceability and anti-smuggling goods with smart phones or smart mobile devices, and provide a new way for the expressive performance of printed images containing the hidden image.

Description

technical field [0001] The invention relates to the technical field of information identification and anti-counterfeiting of smart phones or smart mobile devices, in particular to a method for enhancing the authenticity and expressiveness of decrypted hidden images in digital images. Background technique [0002] The technique of hiding other images or information within printed diagrams has a long history. With the digital development of printing, more and more technical methods for hiding images or information have been developed and applied, the most widely used in the field of anti-counterfeiting. The most representative high-fidelity image collection technologies include Graphics Security System's SI technology, JURA's ICI technology, and the high-fidelity image collection digital hanging network technology with patent application numbers 201610519053.3 and 201610518384.5. [0003] The actual displayed image that the observer can see is called the surface image; the im...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T7/00G06T7/60H04M1/725H04N1/32
CPCH04N1/32272G06T7/00G06T7/60G06T2207/10016H04M1/72403
Inventor 臧戈平
Owner 臧戈平
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products