Font Size: a A A

Research And Application On Tamper-Proofing Technology For Traffic Violation Images

Posted on:2014-02-18Degree:MasterType:Thesis
Country:ChinaCandidate:B F ZhengFull Text:PDF
GTID:2268330425475592Subject:Control Engineering
Abstract/Summary:PDF Full Text Request
As the contradiction between traffic management and the needs of society is prominent, electronic police products are widely developed and used in order to improve the efficiency of road traffic management. The traffic violation images become an important legal basis for traffic offense. Because of the rapid development of computer technology and image processing technology, faking images and tampering with the image content becomes much easier. Ensure authenticity, validity and legality of traffic violation images is more important. Therefore, the research for traffic violation images tamper-proofing algorithm has important theoretical significance and application value.Digital watermark technology is an effective method for images tamper-proofing. But most algorithms for large-volume JPEG images have low real-time performance and bad resistant robustness to low-quality JPEG compression. Considering these, this paper proposes a tamper-proofing algorithm for JPEG images. In order to avoid original illegal images being tampered artificially during network transmission, storing, and proofreading, the algorithm embeds and extracts watermark for traffic violation images and accurately identify the security status of the images. The main research and innovations of this paper are listed as follows:1. For the problems of traffic violation images tamper-proofing processing, an improved JPEG images watermark method based on domain correlation was proposed. Arnold transformation was done for the watermark information. During the JPEG image compression, combining the invariance of the relationship before and after JPEG compression, the human visual characteristic and various image features were applied to control the watermarking intensity. The algorithm has strong robustness for low-quality JPEG compression and good real-time processing performance for large-volume traffic violation JPEG images. Ensuring the real-time performance and robustness, this algorithm is very useful for the illegal images tamper-proofing in the traffic monitoring system.2. An electronic police frond-end system based on linux was designed and implemented with the separation mode between interface software and business software. Meanwhile, an illegal behavior images tamper-proof processor was designed and implemented based on the algorithm proposed in this paper. In this way, the electronic police system acquired the ability of illegal images tamper-proof and the practicability of the algorithm was proved.3. Finally, conclusions, shortages and suggestions were given.
Keywords/Search Tags:electronic police, digital watermark, image content features, real-time, robustness
PDF Full Text Request
Related items