Unlock instant, AI-driven research and patent intelligence for your innovation.

A method of image authentication based on ambtc

An image authentication and image technology, applied in the field of image processing, can solve the problem of being unable to resist collage attacks, and achieve the effect of improving the verification accuracy

Active Publication Date: 2022-05-03
FUQING BRANCH OF FUJIAN NORMAL UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Disadvantage 1: Watermark image quality and verification accuracy can be further improved
[0010] Disadvantage 2: Unable to resist collage attack (collage attack: an attack method that copies a certain part from an embedded watermarked image and pastes it into another embedded watermarked image)
Therefore, the method is not immune to collage attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of image authentication based on ambtc
  • A method of image authentication based on ambtc
  • A method of image authentication based on ambtc

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Please refer to figure 1 , a kind of image authentication method based on AMBTC, comprises steps:

[0028] Also include before step S1:

[0029] S0. Generate a watermarked image including a second verification watermark through AMBTC compression according to the original image.

[0030] Step S0 specifically includes:

[0031] S01. According to the original image, the corresponding AMBTC compression code is obtained after the new variant AMBTC compression processing;

[0032] Step S01 is specifically:

[0033] S011. Form each 4*4 image block in the original image into a one-dimensional pixel sequence in a raster scanning manner, and represent it as I b ={b 1 ,b 2 ,...,b 16};

[0034] S012, centroid initialization, from the I b Derive U, where, and make I b Each pixel value in is included in U and any two elements in U are different. If the number of elements in U |U|≥2, then select two elements to construct an initial centroid set C={c 1 ,c 2}, and execute ...

Embodiment 2

[0058] The difference between this embodiment and Embodiment 1 is that this embodiment will further illustrate how the above-mentioned AMBTC-based image authentication method of the present invention is implemented in combination with specific application scenarios:

[0059] The present invention mainly includes three aspects: watermark generation, watermark embedding and image verification and reconstruction process;

[0060] 1. Generation of watermark

[0061] The corresponding AMBTC compression code after the original image I is compressed and processed by the new variant AMBTC According to the AMBTC compression code, a new compression code is obtained after N variant AMBTC compression processing, and a corresponding second verification watermark is generated through a hash function according to the new compression code and position information; specifically, for each block correspond to (h k , l k ,B' k ) and the current block position information k are fed to the has...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An AMBTC-based image authentication method provided by the present invention obtains an image to be authenticated and extracts a corresponding first verification watermark; performs image authentication on the image to be authenticated according to the first verification watermark and preset rules , which improves the verification accuracy and can resist collage attacks.

Description

technical field [0001] The invention relates to the technical field of image processing, in particular to an AMBTC-based image authentication method. Background technique [0002] In 2018, Hong Weien and others proposed the Detectability Improved TamperDetection Scheme for Absolute Moment Block Truncation (an effective AMBTC compressed image authentication scheme) in the symmetry journal, which includes two strategies: LSBR and MSBP. In the LSBR strategy, the traditional AMBTC technology is used to compress the image to obtain the AMBTC compression code. Here, it is assumed that a certain group of compressed codes is (h, l, B). Wherein, h and l are 8-bit high quantization value and low quantization value respectively, and B is the bitmap corresponding to the image block. In the LSBR scheme, the lower a bit of h and the lower b bit of l are vacated and used to carry (a+b) bit verification watermark ac. The calculation of the verification watermark ac is as follows: [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
CPCG06T1/0021G06T1/0057G06T2201/0065
Inventor 蔡碧丽苏国栋
Owner FUQING BRANCH OF FUJIAN NORMAL UNIV