Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image self-authentication method based on hash function and information hiding

A technology of information hiding and hash function, which is applied in the direction of image data processing, image data processing, encryption device with shift register/memory, etc. It can solve the problems of being easily obtained by illegal users and the security of watermark information cannot be obtained well Guarantee and other issues, achieve good applicability and portability, facilitate implementation, and reduce resource consumption

Pending Publication Date: 2022-07-22
XIAN UNIV OF POSTS & TELECOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security of these watermark information cannot be well guaranteed, and it is easy to be obtained by illegal users, resulting in tampered or forged images that can also pass the authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image self-authentication method based on hash function and information hiding
  • Image self-authentication method based on hash function and information hiding
  • Image self-authentication method based on hash function and information hiding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0063] The invention uses the SM3 algorithm and the symmetric information hiding algorithm to perform integrity authentication on the images in the digital image library. First, the image owner uses the SM3 algorithm to generate a hash value H for the images to be transmitted. f , and use piecewise logistic map to generate random sequence a i , so as to get the hidden bit p of the hash value i . Then, the hash value is embedded at the peak point of the image histogram through the histogram translation algorithm, so as to obtain the camouflage object S t . The authenticator gets the mas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an image self-authentication method based on a hash function and information hiding. The method comprises the following steps: step-by-step hash storage is carried out, an image hash value is calculated, and an information hiding bit pi is determined; embedding the hash value into the image by using reversible information hiding based on histogram translation; and image self-authentication: the receiver extracts the hash value of the image to authenticate the integrity of the original image. According to the method, the hash value of the image is hidden in the image, and the authentication party can directly extract the hash value from the image and recover the original image. And the image authentication can be realized only by performing hash on the recovered image again and comparing the obtained hash value with the extracted hash value. Therefore, self-authentication of the image can be realized, signature information does not need to be stored independently like image digital signature, and resource consumption is reduced.

Description

technical field [0001] The invention relates to an image self-authentication method, in particular to an image self-authentication method based on a hash function and information hiding. Background technique [0002] At present, image information has been widely used in various [0003] On the one hand, it has brought huge benefits to the economic development of human society. However, with the emergence of many powerful image editing software, it has become extremely easy for people to edit digital images without leaving obvious traces. Some people with ulterior motives may tamper with the images maliciously to achieve a certain purpose. Usually, these tampered images are difficult to identify and cause great harm. [0004] How to ensure the authenticity and integrity of images in digital image library has important research significance. For example, in the medical image database, how to ensure that the patient's medical images have not been tampered with by people with...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00H04L9/06
CPCG06T1/0042H04L9/0643
Inventor 任方郝艳莉张哲琳于明宇修海燕姚雪梅杨益萍
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products