Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Perceptual hashing-based practical and safe image forensic system and forensic method

A perceptual hashing and image authentication technology, applied in image data processing, image data processing, digital data authentication, etc., can solve problems such as slow retrieval speed, security damage, and impact on putting into use, and achieve fast retrieval balance and enhancement The effect of identity authentication and sensitivity balance

Active Publication Date: 2013-07-31
ANHUI TELECOMM ENG
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As pointed out in [4], because the same key is used multiple times by the same user in the current algorithm, malicious users can estimate the key more accurately based on the unique intercept, thus destroying its security;
[0007] 2. Lack of perceptual hash algorithm with balanced performance, which seriously affects the application of forensic systems based on perceptual hash function
Some algorithms are sensitive, but the retrieval speed is too slow. In the actual system, there are often a large number of forensic images and perceptual hash libraries. If the speed is too slow, it is unbearable in the actual system, which affects its final use
[0008] 3. Lack of application-oriented systematic solutions
Current research focuses on single-performance algorithms, such as robustness algorithms or tampering location algorithms, and does not provide a relatively comprehensive forensic system solution, let alone a practical solution that can integrate security, robustness, sensitivity, and fast retrieval. Security Forensics System

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Perceptual hashing-based practical and safe image forensic system and forensic method
  • Perceptual hashing-based practical and safe image forensic system and forensic method
  • Perceptual hashing-based practical and safe image forensic system and forensic method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] see figure 1 , the image authentication system based on perceptual hashing in this embodiment includes module a, module b and module c; wherein:

[0071] Module a is the certificate management unit, denoted as CA; module b is the forensics computing unit, denoted as FCP; module c is the trusted forensics center, denoted as FC;

[0072] see figure 2 , when the user registers with the CA, the CA issues a digital certificate to the authenticated user for identity authentication in future communication; CA also issues a digital certificate to FCP and FC to authenticate the identity during communication;

[0073] When the FCP calculates the image hash value, the CA assigns the partition key and the encryption key to the FCP, see Figure 4 , used to calculate the hash value;

[0074] When performing image authentication, FC sends the image ID to CA, and CA sends the regional key and encryption key to FCP for comparison calculation according to the received image ID;

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a perceptual hashing-based practical and safe image forensic system and a perceptual hashing-based practical and safe image forensic method. The system comprises a certificate authority (CA), forensics computing platform (FCP) and a forensic center (FC). The method comprises the following steps that: the CA provides a certificate for a user, the FCP and the FC and distributes and manages a control key of a hash function for the FCP and the FC; the FCP calculates a characteristic value and generates a hash value of an image at a registration or forensics stage; the FC manages an image hash value from the FCP and provides retrieval and forensics services; the user submits the image to the FCP, extracts an image retrieval characteristic by using the FCP, calculates the hash value of an image segment by using a key distributed by the CA and submits the hash value to an FC database; and when the user needs an authentication image, the image is also submitted to the FCP, the retrieval characteristic is extracted to retrieve the most coincident original image from the FC, the image is segmented and the hash value is calculated by using the same key and the difference between the image and the hash value is compared so as to determine a position on which content tampering occurs. The system achieves high balanced performance in the aspects of safety, robustness, sensibility, rapid retrieval and the like.

Description

technical field [0001] The invention belongs to the field of digital image security, in particular to a safe and practical image content tampering evidence collection system and a evidence collection method. Background technique [0002] Digital images are used more and more widely on the Internet. On the Internet, 98.75% of the multimedia content of web pages are images. At the same time, digital images play an important role in various fields of social life. At present, with the development of digitization and network technology, the generation, acquisition, storage and transmission of digital images are extremely convenient. At the same time, various image processing software (such as PhotoShop, etc.) have emerged one after another, making it extremely easy for people to process and process images. Some of these processing and treatments are for the purpose of repair or beautification, while others have malicious destructive effects. For example, in the field of scienc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/16G06T1/00G06F21/10G06F21/31
Inventor 胡东辉侯整风吴共庆胡学钢吴信东赵俊杰
Owner ANHUI TELECOMM ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products