A method of image authentication based on ambtc
An image authentication and image technology, applied in the field of image processing, can solve the problem of being unable to resist collage attacks, and achieve the effect of improving the verification accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0027] Please refer to figure 1 , a kind of image authentication method based on AMBTC, comprises steps:
[0028] Also include before step S1:
[0029] S0. Generate a watermarked image including a second verification watermark through AMBTC compression according to the original image.
[0030] Step S0 specifically includes:
[0031] S01. According to the original image, the corresponding AMBTC compression code is obtained after the new variant AMBTC compression processing;
[0032] Step S01 is specifically:
[0033] S011. Form each 4*4 image block in the original image into a one-dimensional pixel sequence in a raster scanning manner, and represent it as I b ={b 1 ,b 2 ,...,b 16};
[0034] S012, centroid initialization, from the I b Derive U, where, and make I b Each pixel value in is included in U and any two elements in U are different. If the number of elements in U |U|≥2, then select two elements to construct an initial centroid set C={c 1 ,c 2}, and execute ...
Embodiment 2
[0058] The difference between this embodiment and Embodiment 1 is that this embodiment will further illustrate how the above-mentioned AMBTC-based image authentication method of the present invention is implemented in combination with specific application scenarios:
[0059] The present invention mainly includes three aspects: watermark generation, watermark embedding and image verification and reconstruction process;
[0060] 1. Generation of watermark
[0061] The corresponding AMBTC compression code after the original image I is compressed and processed by the new variant AMBTC According to the AMBTC compression code, a new compression code is obtained after N variant AMBTC compression processing, and a corresponding second verification watermark is generated through a hash function according to the new compression code and position information; specifically, for each block correspond to (h k , l k ,B' k ) and the current block position information k are fed to the has...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


