Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks
A digital image and authentication method technology, applied in image data processing, image data processing, instruments, etc., can solve the problems of low positioning accuracy, adding texture features, redundancy, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0056] A variable-capacity watermark generation and authentication method with recoverable digital image tampered content, including four parts: watermark generation and embedding, watermark extraction and comparison, tamper detection and tamper recovery.
[0057] A. Watermark generation and embedding
[0058] figure 1 It is a block diagram of the specific steps of watermark generation and embedding in the method of the embodiment of the present invention, including the following five steps:
[0059] A1. Image block and classification: divide the original image X with a size of 2m×2n into m×n 2×2 image blocks that do not overlap each other i ={x i1 , X i2 , X i3 , X i4 }, where i is the image block number, i=1, 2,..., N, N=m×n is the number of image blocks; and the image blocks are divided into smooth image blocks and non-smooth images according to the content of the image blocks Two types of blocks;
[0060] Image block classification in this embodiment: for 2×2 image block X i ={x ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com