Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image reliability certification method based on quadtree

An authentication method and quadtree technology, which is applied in the field of image reliability authentication based on quadtree, can solve the problems of image use influence, inappropriate modification, etc., and achieve the effect of security guarantee and simple method

Inactive Publication Date: 2004-12-29
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this kind of scheme modifies the image very little, and the image distortion caused is so small that the human visual system is not easy to detect, but it will bring irreversible changes to the image after all, which is still acceptable in ordinary use , but when the image is enlarged, emphasized and processed by the computer, it is easy to have a certain impact on the use of the image, and some images with strict quality requirements (such as medical images, artistic images, etc.) are not suitable for modification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image reliability certification method based on quadtree
  • Image reliability certification method based on quadtree
  • Image reliability certification method based on quadtree

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0017] 1. Information hiding:

[0018] Such as figure 1 process for information hiding. Set the size to M 1 × M 2 The original image X is divided into many L 1 × L 2 (L 1 = 2 l , L 1 = 2 k , l, k=1, 2, ...) non-overlapping blocks X r (r=1, 2,..., n), the binary concealment mark W is divided into m non-overlapping blocks W v (v=1, 2, ..., m), each image block X r Divided into m smaller non-overlapping image blocks X r(v) . H( ) represents the Hash function on the password, and its output size is equal to each hidden identification block W v the size of. Calculate the Hash value of each smaller image block with the key K

[0019] h r(v) =H(X r(v) , K), (r=1,2,...,n; v=1,2,...,m)

[0020] In order to facilitate the description of the quadtree generation process, it is necessary to clarify the concept of the sim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The reliable image confirming method based on quad tree performs the similarity comparison between the Hash value of original image block and the hidden mark to create quad tree with spatial image information recorded and sends the quad tree to identification center for registration to obtain quad tree with time seal. During image identification, quad tree with time seal is obtained from the identification center, and the quad tree and the image to be identified are blocked and real-time calculated to obtain Hash value and restore the hidden mark. The present invention can judge whether the image has been distorted and locate the distorted part correctly without needing of altering the image, and is simple and practicable.

Description

technical field [0001] The invention relates to a quadtree-based image reliability authentication method, which is an image authentication method that is especially suitable for reliability and integrity authentication in digital image transmission and storage, and can locate malicious tampering. Background technique [0002] In today's digital information age, the rapid development of computer network and Internet communication technology makes the transmission and copying of digital image information more and more convenient and fast, and the problems of piracy, infringement, and tampering caused by it are becoming more and more prominent. Therefore, there is an urgent need for digital image authentication technology. Identification of intellectual property and authenticity of transmitted content. At present, the digital watermarking technology to solve these problems has become more and more research hotspots at home and abroad. According to different application purposes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
Inventor 王宏霞何晨丁科
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products