Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

66 results about "Image integrity" patented technology

Processing method and device for conducting quality assurance on mass shared medical images

The invention relates to a processing method and device for conducting quality assurance on mass shared medical images. The device has the function of according with DICOM standard communication, further comprises an image index information quality verification module and an image control module, can define image index information verification values and image number thresholds by itself, can conduct image integrity verification, can obtain patient verification information from a hospital information system or region information system, conducts automatic and manual verification on the provided verification information, updates DICOM label values corresponding to the images after the verification is completed, can further control whether to send the thresholds to other information systems or not according to the image number threshold definition, and accordingly guarantees the uniformity, integrity and correctness of the patient check information on the images and other information systems. The processing method and device can be applied to a sharing platform of a hospital and a region, solve the problems that the patient information of the hospital information system or region sharing collaboration platform is inconsistent with that of an image information system, and provides quality assurance for sharing of the mass medical images.
Owner:SHANGHAI INST OF TECHNICAL PHYSICS - CHINESE ACAD OF SCI

Semi-fragile unique image watermark embedding method for integrity protection and semi-fragile unique image watermark extraction method for integrity protection

The present invention provides a semi-fragile unique image watermark embedding method for integrity protection from the semi-fragile watermark of an image. The method comprises the following steps: 1) generating a two-dimensional code image watermark according to the watermark information of a carrier image; 2) performing scrambling processing of the two-dimensional code image watermark, and obtaining a safety watermark; 3) embedding the safety watermark into the wavelet transform domain of the carrier image, obtaining an image embedded with the watermark, and generating an extraction watermark secret key; and 4) distributing the image embedded with the watermark and the extraction watermark secret key at the same time. The present invention provides an extraction method aiming at the embedding method mentioned above. The semi-fragile unique image watermark embedding method for integrity protection and the semi-fragile unique image watermark extraction method for integrity protection are effective and feasible and can authenticate the image integrity, the scheme is concise and efficient, many defects of a current image semi-fragile watermark are overcome, and the semi-fragile unique image watermark embedding method for integrity protection and the semi-fragile unique image watermark extraction method for integrity protection have important meanings for the integrity protection of digital images.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

Camera shooting control method and system and interactive intelligent integrated tablet computer

The invention relates to a camera shooting control method and system and an interactive intelligent integrated tablet computer. The camera shooting control method comprises the steps of when an operator operates an interactive intelligent tablet computer, controlling mobile cameras to shoot an area in front of the interactive intelligent tablet computer so as to acquire an original image, wherein the mobile cameras are cameras which are arranged on the interactive intelligent tablet computer and controlled in the horizontal and vertical directions; recognizing an operator image according to image data, calculating location information of the operator image in the original image, and calculating the angle adjustment amount required by the operator image to move into a preset edge line of the image according to the location information; and generating a camera shooting angle adjustment instruction according to the angle adjustment amount, an sending the camera shooting angle adjustment instruction to the mobile cameras so as to adjust the camera shooting angle. According to the technical scheme, the camera shooting angle can be adjusted according to different scenes, the integrity of the operator image is ensured, and the camera shooting method can adapt to camera shooting requirements of difference scenes.
Owner:GUANGZHOU SHIYUAN ELECTRONICS CO LTD +1

Safe and active image tampering detection method and device

The embodiment of the present invention discloses a safe and active image tampering detection method and device. The method comprises: sending end equipment obtaining a first image, generating a random value of which the length is a second numerical value, obtaining a pre-configured fixed value of which the length is a third numerical value, and using the random value and the fixed value for generating a specified type character string of which the length is a first numerical value; performing Hash operation on the first image and the specified type character string by using an information digest algorithm to obtain a first information digest value; performing encryption processing on the specified type character string by using an encryption algorithm to obtain an encrypted specified type character string; adding the first information digest value and the encrypted specified type character string to the first image for obtaining a second image; sending the second image to receiving end equipment; and the receiving end equipment using the first information digest value and the encrypted specified type character string for detecting whether the first image is tampered or not. In the embodiment of the present invention, the image integrity and the image authenticity in the process of obtaining evidence for the images are ensured.
Owner:BEIJING UNIV OF POSTS & TELECOMM

GF-2 image integrity authentication method using SIFT and SVD perceptual hash

The invention discloses a GF-2 image integrity authentication method using SIFT and SVD perceptual hash. The method comprises the steps of image perceptual hash sequence generation and image content integrity authentication, and the image hash sequence generation comprises the steps of constructing perceptual hash sequences of sub-blocks by using an SIFT operator and an SVD method after an image is subjected to block processing, and further connecting the perceptual hash sequences of all the sub-blocks in series to generate a perceptual hash sequence of a whole image. During image integrity authentication process, the detection of the image integrity is realized by measuring the degree of differentiation between the Euclidean distance between the perceptual hash sequences of the original image and the image to be authenticated and the initial threshold. And if the Euclidean distance between the two sub-blocks is smaller than an initial threshold value, a judgment is made that the imagecontent is complete, and if not, an image is detected to be tampered, thereby completing positioning of a local tampered region through difference measurement of perceptual hash between the sub-blocks. The invention has good robustness and is a GF-2 image content integrity authentication method with high practicability.
Owner:LANZHOU JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products