Image false-proof method based on chaotic characteristic

An image and chaotic technology, applied in the fields of information hiding and information security, can solve the problem of insufficient security of cryptographic algorithms, and achieve the effect of carrying a large amount of information, simple realization, and high practical value.

Inactive Publication Date: 2006-02-22
XI AN JIAOTONG UNIV
View PDF0 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The object of the present invention is to provide an image anti-counterfeiting method based on chaotic characteristics, which applies the chaotic system to the encryption and decryption of information, and solves the problem that the existing cryptographic algorithm is not safe enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image false-proof method based on chaotic characteristic
  • Image false-proof method based on chaotic characteristic
  • Image false-proof method based on chaotic characteristic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0032] The image information anti-counterfeiting method based on the chaotic characteristics of the present invention is divided into two parts, one part is information hiding, including performing chaotic encryption and hiding of original information, and generating a two-dimensional barcode image; the other part is information identification, including identifying the barcode image to obtain The chaotic information carried in the barcode and the chaotic decryption of the chaotic information to obtain the original information, such as figure 1 As shown, the method proceeds in the following steps:

[0033] information hiding

[0034] The first step is to first select the information that needs to be kept confidential and anti-counterfeiting, such as text, images, etc., such as figure 2 , and control the information capacity within ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a image counterfeit deterrence method based on the chaotic feature, comprising: first, by the chaotic mapping system, using the information needed keep secret and counterfeit deterrence to generate the chaotic sequence which is used to encode the information, then, printing the encoded information to the two-dimension bar code image according to the PDF417 bar code; collecting the two-dimension bar code image by the scanner, and operating the preprocessing of image segmentation, filtration, geometric correction and stratified on collected image, then decoding the bar code according to the decoding rule of national standard PDF417 bar code to attain the chaotic encoded information carried by bar code image. The invention fully utilizes the features of chaotic system and two-dimension bar code technique which are combined for image counterfeit deterrence. The invention has the characters as strong secret-keeping property and large information carried, while it can recognize automatically.

Description

technical field [0001] The invention belongs to the technical fields of information security and information hiding, and relates to an image anti-counterfeiting method, in particular to an image anti-counterfeiting method based on chaotic characteristics. Background technique [0002] Information security and information hiding are currently hot issues that people are concerned about. People often need to hide some key information and take it out conveniently when needed, so as to realize information hiding and anti-counterfeiting. Cryptography is the core of information security. To ensure the confidentiality of information, using passwords to encrypt it is the most effective way. Encryption is one of the most important technical measures to ensure information security. It can not only be used to protect the confidentiality of information, but also can be used to detect data integrity, etc., and has a wide range of uses. However, with the development of cryptography and th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00G06K19/06G06K7/00G06T1/00
Inventor 田丽华赵季中郑南宁
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products