Method and device for generating security image, method and device for identifying security image, and computer storage medium

A technology of images and target images, applied in the computer field, can solve the problems of anti-counterfeiting images being easily deciphered and low security, and achieve the effect of improving the degree of image anti-counterfeiting, difficulty and cost

Active Publication Date: 2017-10-13
ADVANCED NEW TECH CO LTD
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides a method and device for generating and identifying an anti-counterfeit image, ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for generating security image, method and device for identifying security image, and computer storage medium
  • Method and device for generating security image, method and device for identifying security image, and computer storage medium
  • Method and device for generating security image, method and device for identifying security image, and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0072] Terms used in the embodiments of the present application are only for the purpose of describing specific embodiments, and are not intended to limit the present application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of the invention provide a method and a device for generating a security image. The method includes the following steps: acquiring an original image to be processed; generating a graphic code according to a graphic code algorithm; transforming the original image from the space domain to the frequency domain, and calculating the amplitude code of the gray change of the original image in the frequency domain; superposing the spectrum of the amplitude code and the spectrum of the graphic code; and transforming the result after spectrum superposition from the frequency domain to the space domain, and generating a security image containing the graphic code. According to the embodiment, a security graphic code is added to the frequency domain of the original image through transformation from the space domain to the frequency domain. Although the security image generated through transformation from the frequency domain to the space domain contains the graphic code, the graphic code is invisible to the eye. Therefore, the degree of image security is improved, and the difficulty and cost of security image decoding are increased.

Description

technical field [0001] The embodiments of the present application relate to the field of computer technology, and in particular to a method and device for generating and identifying an anti-counterfeiting image, and a computer storage medium. Background technique [0002] With the continuous development of image processing technology, there are more and more means to process images, and the functions of image processing are becoming more and more powerful. [0003] Image processing can provide people with a lot of convenience, for example, people can use image processing software to beautify photos. However, some people will use image processing technology to engage in some illegal things. [0004] Taking AR (Augmented Reality, augmented reality technology) red envelopes as an example, users can put electronic greeting cards, gift money, etc. into the "red envelopes", and then hide the "red envelopes" in a designated location for other users to find. When other users are l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
CPCG06F21/602G06T1/0021G06T9/007G06T11/001G06T19/006
Inventor 丁伟伟
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products