Font Size: a A A

Research And Application Of Image Authentication Technology Based On Unique Identification

Posted on:2021-02-06Degree:MasterType:Thesis
Country:ChinaCandidate:Y J ZhengFull Text:PDF
GTID:2428330623481251Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
As an important carrier of Internet information source propagation,image is more likely to be believed by picture is truth,which has higher requirements on the authenticity and integrity of image content,and makes image authentication a research hotspot in the field of information security and copyright protection.Headed by the DOI,CDOI,DCI system in recent years,unique technology,research and applied more widely to resources unique,durable and references for resources,identification,location,and long-term preservation plays an important role,more than several identifier schemes have been proposed and widely used in digital publishing,long-term preservation of digital resources,and other fields.As an important part of digital resources,the unique identification technology has important research value in image authentication.This article first unique identification technology to do a simple introduction,respectively with foreign research and application of more extensive DOI identity,as well as the domestic CDOI,for example,further introduces technology of unique identification,combining the SM3 countries close algorithm respectively,QR code technology,digital watermarking technology,SHA3 function,on the basis of the existing unique identification techniques,respectively.The main work of this paper is as follows:1.Based on the existing DOI coding scheme and combined with the SM3 algorithm,an image authentication algorithm based on SM3 and DOI is proposed,which makes the traditional DOI mark have the function of safe and verifiable,and applies the DOI mark to the image authentication.The algorithm of the proposed scheme is introduced in detail,and the algorithm is realized by programming.The superiority,security and feasibility of the scheme are demonstrated by experiments and theoretical analysis.2.Due to the digital images stored in the marking system,are already through image copyright information audit each metadata,then register,storage and distribution of a credible image identification number,through the QR code technology identification number and the corresponding dynamic link address to generate QR code,scan the QR code can be directly for image authentication.So this paper puts forward a mobile terminal image authentication scheme based on two dimensional barcode,and the scheme and the scheme applied to QR code technology are introduced,finallycombining with the experiment and theoretical analysis to verify the image authentication scheme in the mobile terminal of the feasibility and safety,convenience,reduces the complexity of image authentication process,improve the efficiency of certification,and solve the high cost of traditional image authentication technology,cycle is long,has realized the image everywhere can certification,everyone can be certified.3.On the basis of CDOI identification technology,in view of the important value of the image,this paper proposes an image offline authentication based on digital watermarking and CDOI algorithm,to the registered CDOI image,the image CDOI as embedding watermark information,when the image copyright disputes,to extract the watermark information and link to CDOI identity authentication system.The feasibility and safety of the scheme are verified by experiments.4.Outside the marking system for registered the important value of image,combining SHA3 hash function,this paper proposes an image fingerprint authentication based on SHA3 function and digital watermarking algorithm,the watermark of copyright clear information to get the hash value,as based on the digital fingerprint image,and the copyright information and digital fingerprint image is embedded into the carrier image respectively,authentication stage,the copyright information and digital fingerprint image,then extract the copyright information of interest to hash again to get another set of value,compared with the digital fingerprint image authentication,to confirm whether image copyright been tampered with.Finally,the feasibility and superiority of the scheme are verified by experiments.
Keywords/Search Tags:Unique identification, SM3 algorithm, QR code, SHA3 function, Image authentication
PDF Full Text Request
Related items