Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A safe active image tampering detection method and device

An active, image technology, applied in image communication, electrical components, transmission systems, etc., can solve problems such as inability to accurately detect whether the image has been tampered with, incorrect detection results, and the inability of the receiving end device to detect the original image has been tampered with. The effect of ensuring image integrity and image authenticity, avoiding detection results, and ensuring image authenticity

Active Publication Date: 2017-10-03
BEIJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Obviously, the original image has been tampered with in the above process, but the receiver device cannot detect that the original image has been tampered with, resulting in wrong detection results and cannot accurately detect whether the image has been tampered with

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A safe active image tampering detection method and device
  • A safe active image tampering detection method and device
  • A safe active image tampering detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] In view of the problems existing in the prior art, a secure active image tampering detection method is proposed in Embodiment 1 of the present invention, which is applied to a system including a sending end device and a receiving end device. The sender device refers to a device that sends an image, and the receiver device refers to a device that receives an image and performs integrity detection on the image. In a specific application scenario, the sending end device may be a terminal device, and the receiving end device may be an application server. The images referred to in the embodiments of the present invention specifically include, but are not limited to, images generated by sensing applications of terminal devices, for example, reporting images that can be generated by environmental pollution reporting applications, management images generated by public place management applications, and photographing of emergencies. Photo images produced by forensic applications...

Embodiment 2

[0070] A secure active image tampering detection method is proposed in the second embodiment of the present invention, and the method can be applied to a system including a sending end device and a receiving end device. The sender device refers to a device that sends an image, and the receiver device refers to a device that receives an image and performs integrity detection on the image. In a specific application scenario, the sending end device may be a terminal device, and the receiving end device may be an application server.

[0071] The images referred to in the embodiments of the present invention specifically include, but are not limited to, images generated by sensing applications of terminal devices, for example, reporting images that can be generated by environmental pollution reporting applications, management images generated by public place management applications, and photographing of emergencies. Photo images produced by forensic applications, etc.

[0072] It ...

Embodiment 3

[0100] Embodiment 3 of the present invention proposes a secure active image tampering detection method, which can be applied to a system including a sending end device and a receiving end device. The sender device refers to a device that sends an image, and the receiver device refers to a device that receives an image and performs integrity detection on the image. In a specific application scenario, the sending end device may be a terminal device, and the receiving end device may be an application server.

[0101] The images referred to in the embodiments of the present invention specifically include, but are not limited to, images generated by sensing applications of terminal devices, for example, reporting images that can be generated by environmental pollution reporting applications, management images generated by public place management applications, and photographing of emergencies. Photo images produced by forensic applications, etc.

[0102] It should be noted that dig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a safe and active image tampering detection method and device. The method comprises: sending end equipment obtaining a first image, generating a random value of which the length is a second numerical value, obtaining a pre-configured fixed value of which the length is a third numerical value, and using the random value and the fixed value for generating a specified type character string of which the length is a first numerical value; performing Hash operation on the first image and the specified type character string by using an information digest algorithm to obtain a first information digest value; performing encryption processing on the specified type character string by using an encryption algorithm to obtain an encrypted specified type character string; adding the first information digest value and the encrypted specified type character string to the first image for obtaining a second image; sending the second image to receiving end equipment; and the receiving end equipment using the first information digest value and the encrypted specified type character string for detecting whether the first image is tampered or not. In the embodiment of the present invention, the image integrity and the image authenticity in the process of obtaining evidence for the images are ensured.

Description

technical field [0001] The invention relates to the technical field of computer applications, in particular to a safe active image tampering detection method and device. Background technique [0002] In order to detect whether the image has been tampered with during the forensics process, the sending device and the receiving device will agree on the same information digest algorithm, such as MAC (Message Authentication Code, message authentication code) algorithm. Before sending the original image, the sending device uses the MAC algorithm to perform Hash operation on the original image to obtain the first information summary value, and sends the first information summary value and the original image to the receiving device. After receiving the first information digest value and the original image, the receiver device uses the same MAC algorithm to perform Hash operation on the original image to obtain the second information digest value. If the first information digest val...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N1/32H04L29/06
CPCH04L63/04H04N1/32272
Inventor 赵东马华东陈建伟李天元
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products