Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image reliability certification method based on quadtree

An authentication method and quadtree technology, which is applied in the field of image reliability authentication based on quadtree, can solve the problems of image use influence, inappropriate modification, etc., and achieve the effect of security guarantee and simple method

Inactive Publication Date: 2006-10-11
SHANGHAI JIAOTONG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this kind of scheme modifies the image very little, and the image distortion caused is so small that the human visual system is not easy to detect, but it will bring irreversible changes to the image after all, which is still acceptable in ordinary use , but when the image is enlarged, emphasized and processed by the computer, it is easy to have a certain impact on the use of the image, and some images with strict quality requirements (such as medical images, artistic images, etc.) are not suitable for modification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image reliability certification method based on quadtree
  • Image reliability certification method based on quadtree
  • Image reliability certification method based on quadtree

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0017] 1. Information hiding:

[0018] Such as figure 1 process for information hiding. Set the size to M 1 × M 2 The original image X is divided into many L 1 × L 2 (L 1 = 2 l , L l = 2 k , l, k=1, 2, ...) non-overlapping blocks X r (r=1, 2,..., n), the binary concealment mark W is divided into m non-overlapping blocks W v (v=1, 2, ..., m), each image block X r Divided into m smaller non-overlapping image blocks X r(v) . H( ) represents the Hash function on the password, and its output size is equal to each hidden identification block W v the size of. Calculate the Hash value of each smaller image block with the key K

[0019] h r(v) =H(X r(v) , K), (r=1,2,...,n; v=1,2,...,m)

[0020] In order to facilitate the description of the quadtree generation process, it is necessary to clarify the concept...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention proposes a quadtree-based image reliability authentication method, which compares the Hash value of the original image block with the hidden mark to generate a quadtree recording the spatial information of the image, and then sends it to the authentication center Register to get a quadtree with a timestamp. During image authentication, a quadtree with a time stamp is obtained from the authentication center, and the hidden identity is restored through the quadtree and the Hash value that blocks the required authentication image and calculates it in real time. The invention uses the quadtree to record the spatial information of the image and the property that the Hash function is sensitive to input, judges whether the image has been tampered with, and can accurately locate the tampered area. The method is simple and easy, and the image can be provided without modifying the image. Tamper Proof and Confidence Detection.

Description

technical field [0001] The invention relates to a quadtree-based image reliability authentication method, which is an image authentication method that is especially suitable for reliability and integrity authentication in digital image transmission and storage, and can locate malicious tampering. Background technique [0002] In today's digital information age, the rapid development of computer network and Internet communication technology makes the transmission and copying of digital image information more and more convenient and fast, and the problems of piracy, infringement, and tampering caused by it are becoming more and more prominent. Therefore, there is an urgent need for digital image authentication technology. Identification of intellectual property and authenticity of transmitted content. At present, the digital watermarking technology to solve these problems has become more and more research hotspots at home and abroad. According to different application purposes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T9/40G06T1/00
Inventor 王宏霞何晨丁科
Owner SHANGHAI JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products