GF-2 image integrity authentication method using SIFT and SVD perceptual hash

A perceptual hashing, GF-2 technology, applied in the fields of cartography and geographic information systems, to achieve good robustness, effective extraction, and good robustness

Pending Publication Date: 2020-05-05
LANZHOU JIAOTONG UNIV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, currently existing data authentication technologies based on perceptual hash functions are mostly used for multimedia data or ordinary low-resolu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • GF-2 image integrity authentication method using SIFT and SVD perceptual hash
  • GF-2 image integrity authentication method using SIFT and SVD perceptual hash
  • GF-2 image integrity authentication method using SIFT and SVD perceptual hash

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0027] See attached figure 1 , the embodiment of the present invention discloses a GF-2 image integrity authentication method using SIFT and SVD perceptual hashing, including:

[0028] 1. Generation of image hash sequence

[0029] Step 1. Divide the original image into N fixed-size sub-blocks by using fixed block method.

[0030] Among them, the size of N is determined by factors such as specific image size, feature extraction efficiency, and robustness. In...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a GF-2 image integrity authentication method using SIFT and SVD perceptual hash. The method comprises the steps of image perceptual hash sequence generation and image content integrity authentication, and the image hash sequence generation comprises the steps of constructing perceptual hash sequences of sub-blocks by using an SIFT operator and an SVD method after an image is subjected to block processing, and further connecting the perceptual hash sequences of all the sub-blocks in series to generate a perceptual hash sequence of a whole image. During image integrity authentication process, the detection of the image integrity is realized by measuring the degree of differentiation between the Euclidean distance between the perceptual hash sequences of the original image and the image to be authenticated and the initial threshold. And if the Euclidean distance between the two sub-blocks is smaller than an initial threshold value, a judgment is made that the imagecontent is complete, and if not, an image is detected to be tampered, thereby completing positioning of a local tampered region through difference measurement of perceptual hash between the sub-blocks. The invention has good robustness and is a GF-2 image content integrity authentication method with high practicability.

Description

technical field [0001] The invention belongs to the technical field of cartography and geographic information systems, and relates to a GF-2 image integrity authentication method using SIFT and SVD perceptual hashing. Background technique [0002] The Gaofen-2 (GF-2) satellite launched by China in 2014 is a domestic high-resolution image with a spatial resolution higher than 1m. Its appearance marks the first time that domestic remote sensing images have broken through the sub-meter level and reached the world's advanced level. At present, GF-2 images are widely used in national defense military construction, modernization construction, scientific research and other fields. However, GF-2 images often face various types of attacks and malicious tampering in the process of transmission, use, and storage, the most common being the modification or deletion of ground objects. Ensuring the integrity of the image content is very important in practical applications. Before using th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00G06K9/34G06K9/46G06K9/62
CPCG06V20/13G06V10/267G06V10/462G06F18/2133
Inventor 张黎明王昊闫浩文朱睿杜萍
Owner LANZHOU JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products