WO2018120459A1 - Procédé, appareil et dispositif de vérification de l'authenticité d'une image, et support de stockage et extrémité de service - Google Patents
Procédé, appareil et dispositif de vérification de l'authenticité d'une image, et support de stockage et extrémité de service Download PDFInfo
- Publication number
- WO2018120459A1 WO2018120459A1 PCT/CN2017/078001 CN2017078001W WO2018120459A1 WO 2018120459 A1 WO2018120459 A1 WO 2018120459A1 CN 2017078001 W CN2017078001 W CN 2017078001W WO 2018120459 A1 WO2018120459 A1 WO 2018120459A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- image
- authentication identifier
- pixel
- hash fingerprint
- server
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 238000007781 pre-processing Methods 0.000 claims description 21
- 230000008569 process Effects 0.000 claims description 18
- 238000012795 verification Methods 0.000 claims description 16
- 238000004891 communication Methods 0.000 claims description 15
- 238000012545 processing Methods 0.000 claims description 9
- 238000004364 calculation method Methods 0.000 claims description 3
- 230000006870 function Effects 0.000 description 14
- 230000008859 change Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 238000013478 data encryption standard Methods 0.000 description 6
- 238000000605 extraction Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 238000011430 maximum method Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- GNFTZDOKVXKIBK-UHFFFAOYSA-N 3-(2-methoxyethoxy)benzohydrazide Chemical compound COCCOC1=CC=CC(C(=O)NN)=C1 GNFTZDOKVXKIBK-UHFFFAOYSA-N 0.000 description 1
- FGUUSXIOTUKUDN-IBGZPJMESA-N C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 Chemical compound C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 FGUUSXIOTUKUDN-IBGZPJMESA-N 0.000 description 1
- YTAHJIFKAKIKAV-XNMGPUDCSA-N [(1R)-3-morpholin-4-yl-1-phenylpropyl] N-[(3S)-2-oxo-5-phenyl-1,3-dihydro-1,4-benzodiazepin-3-yl]carbamate Chemical compound O=C1[C@H](N=C(C2=C(N1)C=CC=C2)C1=CC=CC=C1)NC(O[C@H](CCN1CCOCC1)C1=CC=CC=C1)=O YTAHJIFKAKIKAV-XNMGPUDCSA-N 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T9/00—Image coding
Definitions
- the present invention relates to the field of image technologies, and in particular, to a method, an apparatus, a device, and a computer readable storage medium for verifying the authenticity of an image.
- the existing method In order to identify the falsified image, the existing method generally adds a watermark to the image, and determines whether the image has been tampered by detecting the integrity of the watermark.
- illegal molecules can re-add the same watermark in the image after tampering with the image, which makes it impossible to identify the image that has been tampered with by illegal molecules, and cannot guarantee the authenticity of the image.
- the main object of the present invention is to provide a method, device, device and computer readable storage medium for verifying the authenticity of an image, which aims to solve the technical problem that the method for verifying the authenticity of an image cannot guarantee the authenticity of the image.
- the present invention provides a method for verifying the authenticity of an image, and the method for verifying the authenticity of an image includes:
- the present invention further provides an apparatus for verifying the authenticity of an image, and the apparatus for verifying the authenticity of the image includes:
- a calculation module configured to calculate a hash value of the image pixel when the image is acquired, to obtain a hash fingerprint of the image
- a splicing module configured to acquire identification information that identifies the image, and splicing the identification information and the hash fingerprint into an authentication identifier to be added to the image;
- a sending module configured to send the image that includes the authentication identifier to the server, so that the server verifies the authenticity of the image according to the authentication identifier in the image.
- the present invention further provides an apparatus for verifying the authenticity of an image
- the apparatus for verifying the authenticity of the image comprises a processor, a network interface, a memory, and a communication bus;
- the communication bus is configured to implement connection communication between a processor, a network interface, and a memory;
- the network interface is configured to connect to a server, and perform data communication with the server;
- the processor is configured to execute a verification image authenticity program stored in the memory to implement the following steps:
- the present invention also provides a computer readable storage medium storing one or more programs, the one or more programs being executable by one or more processors To achieve the following steps:
- the present invention further provides a server for verifying the authenticity of an image
- the server is connected to a client, wherein the client calculates the image pixel when acquiring an image.
- a hash value obtaining a hash fingerprint of the image; acquiring identification information identifying the image, stitching the identification information and the hash fingerprint into an authentication identifier, adding to the image; and including the authentication identifier Sending the image to the server;
- the server is used to:
- the invention calculates a hash value of the pixel of the received image by the client, obtains a hash fingerprint of the image, and splices the obtained identification information and the hash fingerprint into an authentication identifier, adds the image to the image, and sends the identifier
- the server is configured to verify, by the server, the authenticity of the image according to the authentication identifier in the image.
- a hash fingerprint of the image is obtained by pixels of the image, and the image identification information is added to the hash fingerprint to uniquely identify the image, thereby identifying whether the image is falsified by an illegal molecule, and ensuring that the image is The authenticity of the image.
- FIG. 1 is a schematic flow chart of a preferred embodiment of a method for verifying image authenticity according to the present invention
- FIG. 2 is a schematic flowchart of obtaining identification information identifying the image in the embodiment of the present invention, and splicing the identification information and the hash fingerprint into an authentication identifier to be added to the image;
- FIG. 3 is a schematic diagram of functional modules of a preferred embodiment of an apparatus for verifying image authenticity according to the present invention.
- FIG. 4 is a schematic diagram of a functional module of a splicing module according to an embodiment of the present invention.
- FIG. 5 is a schematic structural diagram of a device in a hardware operating environment according to an embodiment of the present invention.
- the present invention provides a method of verifying the authenticity of an image.
- FIG. 1 is a schematic flow chart of a method for verifying the authenticity of an image according to a preferred embodiment of the present invention.
- the method for verifying the authenticity of the image includes:
- Step S10 When the client acquires an image, calculate a hash value of the image pixel to obtain a hash fingerprint of the image.
- the client calculates a hash value of the image by using the pixel value of the image, and obtains a hash fingerprint of the image according to the calculated hash value.
- the image pixel-based fingerprint extraction algorithm is used to obtain the hash value of the image.
- the image pixel-based fingerprint extraction algorithm in this embodiment can avoid a large change of the hash value of the image due to a small change.
- the calculated stability of the image hash value is guaranteed.
- the cryptographic hash function algorithm is extremely sensitive to the input source, and very subtle changes in the input can cause significant changes in the calculated hash value. But sometimes you need to do some harmless operations on the image, such as zooming in or out, but the actual content may not change, but the hash value of the cryptographic hash function output will change greatly, and based on image pixels.
- the fingerprint extraction algorithm does not have this problem.
- step S10 includes:
- Step a when the client acquires the image, pre-process the image to obtain the pre-processed image.
- the image needs to be pre-processed to obtain the pre-processed image.
- step a includes:
- Step a1 when the client acquires the image, performing grayscale processing on the image to obtain the grayscale image;
- the specific process of the client pre-processing the image is: when the client acquires the image, the client performs graying on the image.
- the image is processed to obtain the grayed out image.
- the following four methods are used to grayscale the color image, respectively. For the component method, Maximum method, average method and weighted average method.
- Step a2 reducing the grayscale image to a preset ratio to obtain the reduced image
- the client reduces the grayscale image to a preset ratio to obtain the reduced image.
- the preset ratio is set according to specific needs, such as when set to 8*8, indicating that the grayscale image is reduced to a scale of 8*8.
- step a3 the reduced image is subjected to discrete cosine transform to obtain the preprocessed image.
- the client After the client obtains the reduced image, the client performs discrete cosine transform on the reduced image to obtain the preprocessed image.
- the discrete cosine transform is a transform associated with a Fourier transform that is similar to a discrete Fourier transform, but a discrete cosine transform uses only real numbers.
- the discrete cosine transform is equivalent to a discrete Fourier transform of approximately twice the length. This discrete Fourier transform is performed on a real function (because the Fourier transform of a real function is still a real Even function), in some variants, you need to move the position of the input or output by half a unit.
- Step b calculating a mean value of the pre-processed image pixels, and comparing the pixel values of the pre-processed image pixels to the average value.
- step c if the pixel value of the pixel is greater than the average, the pixel value of the pixel is set to 1.
- step d if the pixel value of the pixel is less than or equal to the average, the pixel value of the pixel is set to 0.
- Step e generating a hash fingerprint of the image according to pixel points having pixel values of 1 and 0.
- the client After the client obtains the pre-processed image, the client extracts pixel values of respective pixels in the pre-processed image, and divides the sum of pixel values of the respective pixel points by the image. The number of pixels is obtained as the average of the image pixels after preprocessing.
- the client compares the pixel values of the respective pixels of the preprocessed image with the mean of the image pixels. When the pixel value of the image pixel is greater than the average of the image pixel, the client sets the pixel value of the image pixel to 1; when the pixel value of the image pixel is less than or equal to the image When the average of the pixels, the client sets the pixel value of the image pixel to 0.
- the client generates a hash fingerprint of the image based on pixel points having pixel values of 1 and 0.
- step S20 the identification information identifying the image is obtained, and the identification information and the hash fingerprint are spliced into an authentication identifier and added to the image.
- the client When the client obtains a hash fingerprint of the image, the client acquires identification information for identifying the image, and the identifier information and the hash fingerprint are spliced into an authentication identifier, and the authentication is performed. An identification is added to the image. It can be understood that the identification information is an identifier that can uniquely represent the image.
- the identification information includes a device name and a redundant character string for acquiring the image.
- the redundant string can be freely set as needed, such as AABB_1122.
- the client may distinguish the hash fingerprint, the device name, and the redundant character string by special characters.
- the special characters include, but are not limited to, "#" and "/”.
- img_footPrint is used to represent the hash fingerprint of the image
- APP_name is used to represent the device name of the image
- redundant_str the authentication identifier may be represented as APP_name#img_footPrint#redundant_str.
- the order of arrangement of the hash fingerprint, the device name, and the redundant character string is not limited.
- the authentication identifier may also be expressed as img_footPrint#APP_name#redundant_str, or expressed as img_footPrint. #redundant_str#APP_name.
- Step S30 Send the image containing the authentication identifier to the server, so that the server verifies the authenticity of the image according to the authentication identifier in the image.
- the server After the client obtains the image containing the authentication identifier, the image containing the authentication identifier is sent to the server. After the server receives the image sent by the client, the server verifies the authenticity of the image according to the authentication identifier in the image. It can be understood that in the present application, the server can be a stand-alone server or a service platform that implements corresponding functions.
- the step of the server for verifying the authenticity of the image according to the authentication identifier in the image includes:
- Step f The server receives the image sent by the client, obtains an authentication identifier of the image, and determines whether the device name in the authentication identifier is consistent with a pre-stored device name.
- Step g if the device name does not match the pre-stored device name, determining that the image is a forged image
- Step h if the device name is consistent with the pre-stored device name, calculating a hash fingerprint of the image
- the server When the identification information includes the device name and the redundant character string of the image, and the server receives the image sent by the client, the server acquires the authentication identifier in the image, Splitting the authentication identifier to obtain a device name, a redundant character string, and a hash fingerprint in the authentication identifier. Further, in the process of splitting the authentication identifier, the server may split the authentication identifier by using the special character.
- the server determines whether the device name in the authentication identifier is consistent with the pre-stored device name.
- the server determines that the image is not captured by the specified device, and is a forged image; when the device name in the authentication identifier is When the pre-stored device names are consistent, the server calculates a hash fingerprint of the image. It should be noted that the process of calculating the hash fingerprint of the image by the server and the hash value of the image pixel by the client to obtain the hash fingerprint of the image is the same, and details are not described herein again.
- Step i if the calculated hash fingerprint is inconsistent with the hash fingerprint in the authentication identifier, determining that the image is a forged image;
- Step j If the calculated hash fingerprint is consistent with the hash fingerprint in the authentication identifier, determine whether the redundant string in the authentication identifier is consistent with the pre-stored redundant string;
- Step k if the redundant character string is inconsistent with the pre-stored redundant character string, determining that the image is a forged image
- Step 1 If the redundant character string is consistent with the pre-stored redundant character string, determine that the image is a real image.
- the server compares the calculated hash fingerprint with the hash fingerprint in the authentication identifier.
- the server determines that the image is illegally falsified, is a forged image; when the calculated hash fingerprint and the authentication
- the server determines whether the redundant character string in the authentication identifier is consistent with the pre-stored redundant character string.
- the server determines that the image is a forged image; when the redundant character string in the authentication identifier and the pre-stored When the redundant strings are identical, the server determines that the image is a real image. It should be noted that the pre-stored device name and the pre-stored redundant character string are sent by the client to the server before sending the authentication identifier.
- the server determines that the image is a real image
- the server sends a message that the verification is successful to the client.
- the client continues to perform the next operation, such as performing an account opening operation.
- the server determines that the image is a forged image
- the server sends a message that the verification fails to the client.
- the client outputs a prompt message prompting the user to retake the image or re-upload the image.
- the hash value of the pixel of the received image is calculated by the client, and the hash fingerprint of the image is obtained, and the obtained identification information and the hash fingerprint are spliced into an authentication identifier and added to the image, and Sending to the server, for the server to verify the authenticity of the image according to the authentication identifier in the image.
- a hash fingerprint of the image is obtained by pixels of the image, and the image identification information is added to the hash fingerprint to uniquely identify the image, thereby identifying whether the image is falsified by an illegal molecule, and ensuring that the image is The authenticity of the image.
- the step S20 includes:
- Step S21 Obtain identification information that identifies the image, and splicing the identification information and the hash fingerprint into an authentication identifier.
- Step S22 generating an encryption key by using a symmetric encryption algorithm
- the client After the client obtains the identifier information that identifies the image, the client splices the identifier information and the hash fingerprint into an authentication identifier, and sends an authentication request to the server.
- the server receives the authentication request, the server obtains a corresponding public key and a private key according to an asymmetric encryption algorithm, stores the private key, and sends the public key to the client.
- the client receives the public key and generates an encryption key through a symmetric encryption algorithm.
- the client may first send an authentication request to the server, and then generate an encryption key by using the symmetric encryption algorithm, or first generate an encryption key by using the symmetric encryption algorithm, and then send an authentication request to the server. Server.
- the symmetric encryption algorithm includes but is not limited to DES (Data Encryption Standard, Data Encryption Standard), 3DES, IDEA (International Data Encryption) Algorithm) and AES (Advanced Encryption) Standard, Advanced Encryption Standard), including but not limited to RSA, Elgamal, and Elliptical Encryption Algorithm ECC.
- Step S23 encrypting the authentication identifier by using the encryption key, and encrypting the encryption key by using a public key sent by the server;
- Step S24 adding the encrypted authentication identifier and the encrypted encryption key to the image.
- the server After the server obtains the encryption key, the server encrypts the authentication identifier by using the encryption key, and encrypts the encryption key by using a public key sent by the server to obtain an encrypted
- the authentication identifier and the encrypted encryption key add the encrypted authentication identifier and the encrypted encryption key to the image.
- the client adds the encrypted authentication identifier to the header file header attached to the image, Specifically added to the name in the Header Make Tag information.
- the header area of the image and the data area are independent of each other, and therefore, after the authentication identifier is added to the image, the content of the image data area is not affected.
- the client After adding the encrypted authentication identifier to the image, the client encrypts the encryption key using the public key, and adds the encrypted encryption key to the image attachment
- the header file header is specifically added to the header in the header.
- the tag information of the MODEL When the server obtains the image, it is named in the header of the image.
- the encrypted authentication information is extracted from the tag information of the Make, and the encrypted encryption key is extracted from the Tag information named MODEL in the header of the image.
- the server decrypts the encrypted encryption key by using a private key corresponding to the public key to obtain the encryption key, and obtains the encryption key.
- the encryption key decrypts the authentication identifier extracted in the tag information of the Make, and obtains the decrypted authentication identifier.
- the server splits the authentication identifier to obtain a device name, a redundant string, and a hash fingerprint in the authentication identifier.
- the authentication identifier is encrypted by the encryption key, and the encryption for encrypting the authentication identifier is encrypted to prevent the image from being tampered with by illegal molecules, thereby ensuring the security of the image during transmission.
- the above-mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
- the present invention further provides an apparatus 100 for verifying the authenticity of an image.
- FIG. 3 is a schematic diagram of functional modules of a device 100 for verifying the authenticity of an image according to a preferred embodiment of the present invention.
- the block diagram shown in FIG. 3 is merely an exemplary diagram of a preferred embodiment, and those skilled in the art surround the module of the apparatus 100 for verifying the authenticity of the image shown in FIG.
- the new module can be easily supplemented; the name of each module is a custom name, and is used only to assist in understanding the various program function blocks of the device 100 for authenticating the verification image, and is not used to limit the technical solution of the present invention.
- the functionality that each module that defines the name has to achieve.
- the apparatus 100 for verifying the authenticity of an image includes:
- the calculating module 10 is configured to calculate a hash value of the image pixel when the image is acquired, to obtain a hash fingerprint of the image.
- the client calculates a hash value of the image by using the pixel value of the image, and obtains a hash fingerprint of the image according to the calculated hash value.
- the image pixel-based fingerprint extraction algorithm is used to obtain the hash value of the image.
- the image pixel-based fingerprint extraction algorithm in this embodiment can avoid a large change of the hash value of the image due to a small change.
- the calculated stability of the image hash value is guaranteed.
- the cryptographic hash function algorithm is extremely sensitive to the input source, and very subtle changes in the input can cause significant changes in the calculated hash value. But sometimes you need to do some harmless operations on the image, such as zooming in or out, but the actual content may not change, but the hash value of the cryptographic hash function output will change greatly, and based on image pixels.
- the fingerprint extraction algorithm does not have this problem.
- computing module 10 includes:
- a pre-processing unit configured to: when the image is acquired, pre-process the image to obtain the pre-processed image.
- the image needs to be pre-processed to obtain the pre-processed image.
- the pre-processing unit is further configured to: when the image is acquired, perform grayscale processing on the image to obtain the grayscale image;
- the specific process of the client pre-processing the image is: when the client acquires the image, the client performs graying on the image.
- the image is processed to obtain the grayed out image.
- the following four methods are used to grayscale the color image, respectively. For the component method, Maximum method, average method and weighted average method.
- the pre-processing unit is further configured to reduce the grayscale image to a preset ratio to obtain the reduced image.
- the client reduces the grayscale image to a preset ratio to obtain the reduced image.
- the preset ratio is set according to specific needs, such as when set to 8*8, indicating that the grayscale image is reduced to a scale of 8*8.
- the pre-processing unit is further configured to perform discrete cosine transform on the reduced image to obtain the pre-processed image.
- the client After the client obtains the reduced image, the client performs discrete cosine transform on the reduced image to obtain the preprocessed image.
- the discrete cosine transform is a transform associated with a Fourier transform that is similar to a discrete Fourier transform, but a discrete cosine transform uses only real numbers.
- the discrete cosine transform is equivalent to a discrete Fourier transform of approximately twice the length. This discrete Fourier transform is performed on a real function (because the Fourier transform of a real function is still a real Even function), in some variants, you need to move the position of the input or output by half a unit.
- a calculating unit configured to calculate a mean value of the pre-processed image pixels, and compare the pixel values of the pre-processed image pixels to the average value.
- a setting unit configured to: if a pixel value of the pixel point is greater than the average value, set a pixel value of the pixel point to 1; if a pixel value of the pixel point is less than or equal to the average value, a pixel of the pixel point The value is set to 0.
- a first generating unit configured to generate a hash fingerprint of the image according to pixel points with pixel values of 1 and 0.
- the client After the client obtains the pre-processed image, the client extracts pixel values of respective pixels in the pre-processed image, and divides the sum of pixel values of the respective pixel points by the image. The number of pixels is obtained as the average of the image pixels after preprocessing.
- the client compares the pixel values of the respective pixels of the preprocessed image with the mean of the image pixels. When the pixel value of the image pixel is greater than the average of the image pixel, the client sets the pixel value of the image pixel to 1; when the pixel value of the image pixel is less than or equal to the image When the average of the pixels, the client sets the pixel value of the image pixel to 0.
- the client generates a hash fingerprint of the image based on pixel points having pixel values of 1 and 0.
- the splicing module 20 is configured to obtain identification information that identifies the image, and splicing the identification information and the hash fingerprint into an authentication identifier to be added to the image.
- the client When the client obtains a hash fingerprint of the image, the client acquires identification information for identifying the image, and the identifier information and the hash fingerprint are spliced into an authentication identifier, and the authentication is performed. An identification is added to the image. It can be understood that the identification information is an identifier that can uniquely represent the image.
- the identification information includes a device name and a redundant character string for acquiring the image.
- the redundant string can be freely set as needed, such as AABB_1122.
- the client may distinguish the hash fingerprint, the device name, and the redundant character string by special characters.
- the special characters include, but are not limited to, "#" and "/”.
- img_footPrint is used to represent the hash fingerprint of the image
- APP_name is used to represent the device name of the image
- redundant_str the authentication identifier may be represented as APP_name#img_footPrint#redundant_str.
- the order of arrangement of the hash fingerprint, the device name, and the redundant character string is not limited.
- the authentication identifier may also be expressed as img_footPrint#APP_name#redundant_str, or expressed as img_footPrint. #redundant_str#APP_name.
- the sending module 30 is configured to send the image that includes the authentication identifier to the server, so that the server verifies the authenticity of the image according to the authentication identifier in the image.
- the image containing the authentication identifier is sent to the server.
- the server After the server receives the image sent by the client, the server verifies the authenticity of the image according to the authentication identifier in the image.
- the sending module 30 is further configured to send the image to the server, where the server receives the And obtaining an authentication identifier of the image, determining whether the device name in the authentication identifier is consistent with the pre-stored device name; if the device name is different from the pre-stored device name, determining that the image is a forged image; If the device name is consistent with the pre-stored device name, the hash fingerprint of the image is calculated; if the calculated hash fingerprint is inconsistent with the hash fingerprint in the authentication identifier, determining that the image is a forged image And if the calculated hash fingerprint is consistent with the hash fingerprint in the authentication identifier, determining whether the redundant string in the authentication identifier is consistent with the pre-stored redundant string; if the redundant string and the Determining that the pre-stored redundant string is inconsistent, determining that the image is a forged image; if the redundant string is consistent with the pre-
- the server When the identification information includes the device name and the redundant character string of the image, and the server receives the image sent by the client, the server acquires the authentication identifier in the image, Splitting the authentication identifier to obtain a device name, a redundant character string, and a hash fingerprint in the authentication identifier. Further, in the process of splitting the authentication identifier, the server may split the authentication identifier by using the special character.
- the server determines whether the device name in the authentication identifier is consistent with the pre-stored device name.
- the server determines that the image is not captured by the specified device, and is a forged image; when the device name in the authentication identifier is When the pre-stored device names are consistent, the server calculates a hash fingerprint of the image. It should be noted that the process of calculating the hash fingerprint of the image by the server and the hash value of the image pixel by the client to obtain the hash fingerprint of the image is the same, and details are not described herein again.
- the server compares the calculated hash fingerprint with the hash fingerprint in the authentication identifier.
- the server determines that the image is illegally falsified, is a forged image; when the calculated hash fingerprint and the authentication
- the server determines whether the redundant character string in the authentication identifier is consistent with the pre-stored redundant character string.
- the server determines that the image is a forged image; when the redundant character string in the authentication identifier and the pre-stored When the redundant strings are identical, the server determines that the image is a real image. It should be noted that the pre-stored device name and the pre-stored redundant character string are sent by the client to the server before sending the authentication identifier.
- the server determines that the image is a real image
- the server sends a message that the verification is successful to the client.
- the client continues to perform the next operation, such as performing an account opening operation.
- the server determines that the image is a forged image
- the server sends a message that the verification fails to the client.
- the client outputs a prompt message prompting the user to retake the image or re-upload the image.
- the hash value of the pixel of the received image is calculated by the client, and the hash fingerprint of the image is obtained, and the obtained identification information and the hash fingerprint are spliced into an authentication identifier and added to the image, and Sending to the server, for the server to verify the authenticity of the image according to the authentication identifier in the image.
- a hash fingerprint of the image is obtained by pixels of the image, and the image identification information is added to the hash fingerprint to uniquely identify the image, thereby identifying whether the image is falsified by an illegal molecule, and ensuring that the image is The authenticity of the image.
- the splicing module 20 includes:
- the splicing unit 21 is configured to acquire identification information that identifies the image, and splicing the identification information and the hash fingerprint into an authentication identifier;
- a second generating unit 22 configured to generate an encryption key by using a symmetric encryption algorithm
- the client After the client obtains the identifier information that identifies the image, the client splices the identifier information and the hash fingerprint into an authentication identifier, and sends an authentication request to the server.
- the server receives the authentication request, the server obtains a corresponding public key and a private key according to an asymmetric encryption algorithm, stores the private key, and sends the public key to the client.
- the client receives the public key and generates an encryption key through a symmetric encryption algorithm.
- the client may first send an authentication request to the server, and then generate an encryption key by using the symmetric encryption algorithm, or first generate an encryption key by using the symmetric encryption algorithm, and then send an authentication request to the server. Server.
- the symmetric encryption algorithm includes but is not limited to DES (Data Encryption Standard, Data Encryption Standard), 3DES, IDEA (International Data Encryption) Algorithm) and AES (Advanced Encryption) Standard, Advanced Encryption Standard), including but not limited to RSA, Elgamal, and Elliptical Encryption Algorithm ECC.
- the encryption unit 23 is configured to encrypt the authentication identifier by using the encryption key, and encrypt the encryption key by using a public key sent by the server;
- the adding unit 24 is configured to add the encrypted authentication identifier and the encrypted encryption key to the image.
- the server After the server obtains the encryption key, the server encrypts the authentication identifier by using the encryption key, and encrypts the encryption key by using a public key sent by the server to obtain an encrypted
- the authentication identifier and the encrypted encryption key add the encrypted authentication identifier and the encrypted encryption key to the image.
- the client adds the encrypted authentication identifier to the header file header attached to the image, Specifically added to the name in the Header Make Tag information.
- the header area of the image and the data area are independent of each other, and therefore, after the authentication identifier is added to the image, the content of the image data area is not affected.
- the client After adding the encrypted authentication identifier to the image, the client encrypts the encryption key using the public key, and adds the encrypted encryption key to the image attachment
- the header file header is specifically added to the header in the header.
- the tag information of the MODEL When the server obtains the image, it is named in the header of the image.
- the encrypted authentication information is extracted from the tag information of the Make, and the encrypted encryption key is extracted from the Tag information named MODEL in the header of the image.
- the server decrypts the encrypted encryption key by using a private key corresponding to the public key to obtain the encryption key, and obtains the encryption key.
- the encryption key decrypts the authentication identifier extracted in the tag information of the Make, and obtains the decrypted authentication identifier.
- the server splits the authentication identifier to obtain a device name, a redundant string, and a hash fingerprint in the authentication identifier.
- the authentication identifier is encrypted by the encryption key, and the encryption for encrypting the authentication identifier is encrypted to prevent the image from being tampered with by illegal molecules, thereby ensuring the security of the image during transmission.
- the above computing module 10, the splicing module 20, the sending module 30, and the like may be embedded in or independent of the device for verifying the authenticity of the image in hardware, or may be stored in the verification image in software. The authenticity of the device's memory, so that the processor calls to perform the corresponding operations of the above modules.
- the processor can be a central processing unit (CPU), a microprocessor, a microcontroller, or the like.
- FIG. 5 is a schematic structural diagram of a device in a hardware operating environment according to an embodiment of the present invention.
- the device for verifying the authenticity of the image in the embodiment of the present invention may be a PC, or may be a smart phone, a tablet computer, an e-book reader, and an MP3 (Moving). Picture Experts Group Audio Layer III, motion picture expert compresses standard audio layer 3) player, MP4 (Moving Picture Experts Group Audio Layer IV, dynamic video experts compress standard audio layers 3) terminal devices such as players and portable computers.
- MP3 Motion Picture Experts Group Audio Layer III, motion picture expert compresses standard audio layer 3
- MP4 Moving Picture Experts Group Audio Layer IV, dynamic video experts compress standard audio layers 3) terminal devices such as players and portable computers.
- the device for verifying the authenticity of the image may include a processor 1001, such as a CPU, a network interface 1004, a memory 1005, and a communication bus 1002.
- the communication bus 1002 is used to implement connection communication between these components.
- the network interface 1004 can optionally include a standard wired interface, a wireless interface (such as a WI-FI interface).
- the memory 1005 may be a high speed RAM memory or a stable memory (non-volatile) Memory), such as disk storage.
- the memory 1005 can also optionally be a storage device independent of the aforementioned processor 1001.
- the device for verifying the authenticity of the image may further include a user interface, a camera, and an RF (Radio) Frequency, RF) circuits, sensors, audio circuits, WiFi modules, and more.
- the user interface may include a display, an input unit such as a keyboard, and the optional user interface may also include a standard wired interface, a wireless interface.
- the picture to be detected can be acquired by the camera.
- the device structure for verifying the authenticity of the image shown in FIG. 5 does not constitute a limitation on the device for verifying the authenticity of the image, and may include more or less components than those illustrated, or may combine some Parts, or different parts.
- an operating system As shown in FIG. 5, an operating system, a network communication module, and a verification image authenticity program may be included in the memory 1005 as a computer storage medium.
- the operating system is a program that manages and controls the device hardware and software resources for verifying the authenticity of the image, and supports the verification of the image authenticity program and the operation of other software and/or programs.
- the network communication module is used to implement communication between the memory 1005 and other hardware and software in the device that verifies the authenticity of the image.
- the network interface 1004 is mainly used to connect to the server and perform data communication with the server; the processor 1001 is configured to execute the verification image authenticity program stored in the memory 1005. Implement the following steps:
- the identifier information includes a device name and a redundant character string for acquiring the image
- the step for the server to verify the authenticity of the image according to the authentication identifier in the image includes:
- calculating a hash value of the image pixel, and obtaining a hash fingerprint of the image includes:
- the image is preprocessed to obtain the preprocessed image
- the pixel value of the pixel is set to 1;
- the pixel value of the pixel is set to 0;
- a hash fingerprint of the image is generated from pixel points having pixel values of 1 and 0.
- preprocessing the image to obtain the preprocessed image includes:
- the image is acquired, the image is subjected to grayscale processing to obtain the grayscale image;
- the reduced cosine transform is performed on the reduced image to obtain the preprocessed image.
- the step of acquiring the identification information that identifies the image, and the step of splicing the identification information and the hash fingerprint into an authentication identifier is added to the image, where
- the encrypted authentication identifier and the encrypted encryption key are added to the image.
- the embodiment of the device for verifying the authenticity of the image is basically the same as the embodiment of the method and device for verifying the authenticity of the image, and details are not described herein again.
- the present invention provides a computer readable storage medium storing one or more programs, the one or more programs being executable by one or more processors to implement the following step:
- the identifier information includes a device name and a redundant character string for acquiring the image
- the step for the server to verify the authenticity of the image according to the authentication identifier in the image includes:
- calculating a hash value of the image pixel, and obtaining a hash fingerprint of the image includes:
- the image is preprocessed to obtain the preprocessed image
- the pixel value of the pixel is set to 1;
- the pixel value of the pixel is set to 0;
- a hash fingerprint of the image is generated from pixel points having pixel values of 1 and 0.
- preprocessing the image to obtain the preprocessed image includes:
- the image is acquired, the image is subjected to grayscale processing to obtain the grayscale image;
- the reduced cosine transform is performed on the reduced image to obtain the preprocessed image.
- the step of acquiring the identification information that identifies the image, and the step of splicing the identification information and the hash fingerprint into an authentication identifier is added to the image, where
- the encrypted authentication identifier and the encrypted encryption key are added to the image.
- the embodiment of the computer readable storage medium of the present invention is substantially the same as the embodiment of the method and apparatus for verifying the authenticity of the image, and details are not described herein again.
- the present invention further provides a server for verifying the authenticity of an image
- the server is connected to a client, wherein the client calculates a hash value of the image pixel when acquiring an image.
- the server is used to:
- the embodiment of the present invention for verifying the authenticity of the image is basically the same as the method and the device for verifying the authenticity of the image, and details are not described herein again.
- the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
- a storage medium such as ROM/RAM, disk,
- the optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Editing Of Facsimile Originals (AREA)
- Storage Device Security (AREA)
Abstract
L'invention concerne un procédé de vérification de l'authenticité d'une image. Le procédé comprend les étapes suivantes : lorsqu'un client acquiert une image, calculer une valeur de hachage d'un pixel de l'image de façon à obtenir une empreinte digitale de hachage de l'image ; acquérir des informations d'identification pour identifier l'image, épisser les informations d'identification et l'empreinte digitale de hachage dans une identification d'authentification, et ajouter cette dernière dans l'image ; et envoyer l'image contenant l'identification d'authentification à une extrémité de service, de telle sorte que l'extrémité de service vérifie l'authenticité de l'image selon l'identification d'authentification dans l'image. L'invention concerne en outre un appareil et un dispositif permettant de vérifier l'authenticité d'une image, et un support de stockage lisible par ordinateur. La présente invention identifie de manière unique une image par obtention d'une empreinte digitale de hachage de l'image au moyen d'un pixel de l'image et ajout d'informations d'identification concernant l'image sur la base de l'empreinte digitale de hachage, de façon à reconnaître si l'image a été modifiée illégalement, et ainsi garantir l'authenticité de l'image.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611240329.0A CN106709963B (zh) | 2016-12-28 | 2016-12-28 | 验证图像真伪的方法和装置 |
CN201611240329.0 | 2016-12-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018120459A1 true WO2018120459A1 (fr) | 2018-07-05 |
Family
ID=58903020
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/078001 WO2018120459A1 (fr) | 2016-12-28 | 2017-03-24 | Procédé, appareil et dispositif de vérification de l'authenticité d'une image, et support de stockage et extrémité de service |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106709963B (fr) |
WO (1) | WO2018120459A1 (fr) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110706145A (zh) * | 2019-09-25 | 2020-01-17 | 中国人民解放军61646部队 | 一种可逆的遥感图像信息隐藏处理方法及装置 |
US20210319136A1 (en) * | 2020-04-02 | 2021-10-14 | UST Global (Singapore) Pte. Ltd. | Verifying authenticity of content of electronic documents |
CN113742611A (zh) * | 2021-01-06 | 2021-12-03 | 北京沃东天骏信息技术有限公司 | 一种数据请求处理方法和装置 |
CN114549299A (zh) * | 2021-11-18 | 2022-05-27 | 平安普惠企业管理有限公司 | 图像处理方法、装置、设备及存储介质 |
CN116012937A (zh) * | 2022-12-14 | 2023-04-25 | 杭州电子科技大学信息工程学院 | 一种交警手势识别方法 |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107612877B (zh) * | 2017-07-20 | 2020-06-30 | 阿里巴巴集团控股有限公司 | 验证多媒体文件合法性的方法、装置和系统 |
CN107944339B (zh) | 2017-10-20 | 2020-01-21 | 阿里巴巴集团控股有限公司 | 一种证件验证、身份验证方法和装置 |
CN108153809A (zh) * | 2017-11-23 | 2018-06-12 | 努比亚技术有限公司 | 图片标识方法、识别方法、终端及计算机可读存储介质 |
CN110032970A (zh) * | 2019-04-11 | 2019-07-19 | 深圳市华付信息技术有限公司 | 高准确率的活体检测方法、装置、计算机设备及存储介质 |
CN111881425B (zh) * | 2020-07-28 | 2024-09-24 | 平安科技(深圳)有限公司 | 图片版权认证方法、装置及存储介质 |
CN114021166A (zh) * | 2021-11-03 | 2022-02-08 | 深邦智能科技(青岛)有限公司 | 一种治超抓拍图像防伪处理方法及其系统 |
CN116070286B (zh) * | 2022-12-02 | 2023-09-29 | 国网数字科技控股有限公司 | 一种数据伪造检测方法、装置及设备 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100496094C (zh) * | 2005-12-31 | 2009-06-03 | 北京华旗数码影像技术研究院有限责任公司 | 通过外部设备获取水印信息的数码相机及其组成的系统 |
CN104935783A (zh) * | 2015-06-15 | 2015-09-23 | 北京邮电大学 | 一种安全的主动式图像篡改检测方法及装置 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103353990A (zh) * | 2013-06-19 | 2013-10-16 | 海南大学 | 一种基于感知哈希的智能纹理防伪方法 |
CN105117920B (zh) * | 2015-08-25 | 2017-03-08 | 福建博思软件股份有限公司 | 一种图片电子凭证的防伪方法及装置 |
-
2016
- 2016-12-28 CN CN201611240329.0A patent/CN106709963B/zh active Active
-
2017
- 2017-03-24 WO PCT/CN2017/078001 patent/WO2018120459A1/fr active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100496094C (zh) * | 2005-12-31 | 2009-06-03 | 北京华旗数码影像技术研究院有限责任公司 | 通过外部设备获取水印信息的数码相机及其组成的系统 |
CN104935783A (zh) * | 2015-06-15 | 2015-09-23 | 北京邮电大学 | 一种安全的主动式图像篡改检测方法及装置 |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110706145A (zh) * | 2019-09-25 | 2020-01-17 | 中国人民解放军61646部队 | 一种可逆的遥感图像信息隐藏处理方法及装置 |
CN110706145B (zh) * | 2019-09-25 | 2023-06-02 | 中国人民解放军61646部队 | 一种可逆的遥感图像信息隐藏处理方法及装置 |
US20210319136A1 (en) * | 2020-04-02 | 2021-10-14 | UST Global (Singapore) Pte. Ltd. | Verifying authenticity of content of electronic documents |
CN113742611A (zh) * | 2021-01-06 | 2021-12-03 | 北京沃东天骏信息技术有限公司 | 一种数据请求处理方法和装置 |
CN114549299A (zh) * | 2021-11-18 | 2022-05-27 | 平安普惠企业管理有限公司 | 图像处理方法、装置、设备及存储介质 |
CN116012937A (zh) * | 2022-12-14 | 2023-04-25 | 杭州电子科技大学信息工程学院 | 一种交警手势识别方法 |
Also Published As
Publication number | Publication date |
---|---|
CN106709963B (zh) | 2018-01-02 |
CN106709963A (zh) | 2017-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018120459A1 (fr) | Procédé, appareil et dispositif de vérification de l'authenticité d'une image, et support de stockage et extrémité de service | |
WO2018086515A1 (fr) | Procédé et dispositif de construction de vérification permettant une vérification hors ligne d'une étiquette d'informations de sécurité | |
WO2021261830A1 (fr) | Procédé et appareil d'évaluation de qualité de vidéo | |
WO2018135919A1 (fr) | Appareil et procédé de fourniture et de gestion d'informations de sécurité dans un système de communication | |
WO2019041406A1 (fr) | Dispositif, terminal et procédé de reconnaissance d'image indécente et support de stockage lisible par ordinateur | |
WO2019051899A1 (fr) | Procédé et dispositif de commande de terminaux, et support d'informations | |
WO2019019378A1 (fr) | Procédé et appareil de traitement de service, adaptateur et support de stockage lisible par ordinateur | |
WO2019019340A1 (fr) | Procédé et appareil d'ouverture de page de programme d'application, terminal et support de mémoire lisible | |
WO2017035695A1 (fr) | Procédé de transmission d'informations et dispositif mobile | |
WO2015061941A1 (fr) | Procédé et appareil de configuration de clé | |
WO2019051908A1 (fr) | Procédé et dispositif de commande de terminal, et support de stockage lisible par ordinateur | |
WO2017039320A1 (fr) | Procédé et dispositif de téléchargement de profil dans un système de communications | |
WO2018166236A1 (fr) | Procédé, appareil et dispositif de reconnaissance de facture de règlement de revendication, et support d'informations lisible par ordinateur | |
WO2017119769A1 (fr) | Appareil et procédé de détection d'annonceur usurpateur dans un système de communications sans fil | |
WO2014007571A1 (fr) | Procédé et appareil de traitement de signaux de service numérique | |
WO2019001110A1 (fr) | Procédé, système et dispositif d'authentification d'autorité, et support d'informations lisible par ordinateur | |
WO2019019376A1 (fr) | Procédé, appareil et dispositif de gestion de processus de service, et support d'informations lisible par ordinateur | |
WO2015108283A1 (fr) | Procédé de détection d'erreurs d'applications pour service de diffusion continue en nuage, et appareil et système associés | |
WO2019051895A1 (fr) | Procédé et dispositif de commande de terminal, et support de stockage | |
WO2016126052A2 (fr) | Procédé et système d'authentification | |
WO2019051890A1 (fr) | Procédé et dispositif de commande de terminal et support de stockage lisible par ordinateur | |
CN105723648A (zh) | 一种密钥配置方法、系统和装置 | |
WO2016171496A1 (fr) | Dispositif d'émission de signal de radiodiffusion, dispositif de réception de signal de radiodiffusion, procédé d'émission de signal de radiodiffusion, et procédé de réception de signal de radiodiffusion | |
EP2839668A1 (fr) | Procédé et appareil pour le traitement de signaux de service numériques | |
WO2020171672A1 (fr) | Procédé d'interfonctionnement entre un processus de téléchargement de faisceau et un processus de téléchargement de profil esim par un terminal ssp |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17887455 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 13.09.2019) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17887455 Country of ref document: EP Kind code of ref document: A1 |