A dual-image active authentication method in fractional tchebichef transform domain

An active authentication and fractional-order technology, which is applied in the fields of information hiding and image security, can solve the problem that it is difficult to further improve the robustness of the algorithm by embedding information, and achieve the effects of ensuring imperceptibility, enhancing embedding strength, and strong robustness

Active Publication Date: 2021-03-02
TAIYUAN UNIV OF TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to design robust active authentication methods for images, it is difficult to further improve the robustness of the algorithm by embedding information in traditional transform domains (such as discrete Fourier transform, Tchebichef transform, etc.)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A dual-image active authentication method in fractional tchebichef transform domain
  • A dual-image active authentication method in fractional tchebichef transform domain
  • A dual-image active authentication method in fractional tchebichef transform domain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0091] Take the image of the boat and the image of the woman as the original image, and the image of the deer as the authentication information.

[0092] Such as image 3 As shown, where (a) the boat image after embedding information, (b) the woman image after embedding authentication information, (c) the extracted deer information, (d) the difference between the boat image after hiding information and the original image, (e ) is the difference between the hidden image of the woman and the original image.

[0093] Images of boats and women to be authenticated (attached image 3 (a), 3(b) shown), is through the appended figure 1 The image with the authentication information hidden in the authentication information embedding process obtained, the added authentication information is a binary image deer (as attached image 3 (c)).

[0094] According to the extraction process of authentication information (as attached figure 2 ), the original embedded authentication informati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dual-image active authentication method in the fractional Tchebichef transformation domain. Two images are used as real and imaginary parts of complex transformation, and authentication information is embedded in the transformation domain of the two images. This method embeds the watermark information into two images at the same time. When extracting the authentication information, the authenticator needs to obtain two authentication images at the same time to extract the authentication information embedded in the image. It has strong resistance to filtering attacks, noise and JPEG compression. Robustness, to further improve the security of the embedded information and the robustness of the authentication method, which can be applied to the copyright protection of two images and the image confidential communication field.

Description

technical field [0001] The invention discloses a dual-image active authentication method in a fractional-order Tchebichef transform domain, belonging to the technical fields of information hiding and image security. Background technique [0002] With the development of computers, mobile communication equipment and multimedia processing software, people can create digital works more conveniently and publish them online to other network users; It can be copied, edited, tampered with and used by more and more users. Therefore, how to effectively prove the copyright of images, determine the authenticity and integrity of images, and protect the legitimate rights and interests of digital media creators has become an urgent problem to be solved. [0003] As a method to authenticate the authenticity of digital images, active authentication methods of images embed authentication information into images. According to the visual masking characteristics of the human eye, it is difficu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04N1/32G06T1/00G06F21/10
CPCG06F21/10G06T1/005H04N1/32154H04N1/32277H04N1/3232
Inventor 刘西林吴永飞岳俊宏周稻祥
Owner TAIYUAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products