• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Xiaofei, Shen Xuanjing, Chen Haipeng, and Lü Yingda. An Image Identification Algorithm Based on Digital Signature Method[J]. Journal of Computer Research and Development, 2012, 49(6): 1348-1356.
Citation: Li Xiaofei, Shen Xuanjing, Chen Haipeng, and Lü Yingda. An Image Identification Algorithm Based on Digital Signature Method[J]. Journal of Computer Research and Development, 2012, 49(6): 1348-1356.

An Image Identification Algorithm Based on Digital Signature Method

More Information
  • Published Date: June 14, 2012
  • In view of the question of images' authenticity, an effective and robust image identification algorithm is presented based on digital signature. Firstly, image is preprocessed to enhance the capability of images' anti-JPEG compression. Then the image is divided into two regions equally, and the top five of image's block average value are extracted and mapped to the element of GF(25) to construct the RS code. The generated check code is scrambled by Arnold transform as digital signature to authenticate the original image. Experimental results show that the algorithm not only can detect whether the content of the image is tampered or not but also can accurately locate the tampered position, which improves the image on the robustness of JPEG compression. Thus this algorithm can effectively distinguish JPEG compression operation from the deliberate tampering.
  • Related Articles

    [1]Duan Zhuohui, Liu Haikun, Zhao Jinwei, Liu Yihang, Liao Xiaofei, Jin Hai. A Reconfigurable Cache Consistency Mechanism for Distributed Memory Pool[J]. Journal of Computer Research and Development, 2023, 60(9): 1960-1972. DOI: 10.7544/issn1000-1239.202330448
    [2]Wei Zheng, Dou Yu, Gao Yanzhen, Ma Jie, Sun Ninghui, Xing Jing. A Consistent Hash Data Placement Algorithm Based on Stripe[J]. Journal of Computer Research and Development, 2021, 58(4): 888-903. DOI: 10.7544/issn1000-1239.2021.20190732
    [3]Tian Junfeng, Wang Yanbiao. Causal-Pdh: Causal Consistency Model for NoSQL Distributed Data Storage Using HashGraph[J]. Journal of Computer Research and Development, 2020, 57(12): 2703-2716. DOI: 10.7544/issn1000-1239.2020.20190686
    [4]Wang Jieting, Qian Yuhua, Li Feijiang, Liu Guoqing. Support Vector Machine with Eliminating the Random Consistency[J]. Journal of Computer Research and Development, 2020, 57(8): 1581-1593. DOI: 10.7544/issn1000-1239.2020.20200127
    [5]Chen Bo, Lu Youyou, Cai Tao, Chen Youmin, Tu Yaofeng, Shu Jiwu. A Consistency Mechanism for Distributed Persistent Memory File System[J]. Journal of Computer Research and Development, 2020, 57(3): 660-667. DOI: 10.7544/issn1000-1239.2020.20190074
    [6]Sun Xuejiao and Liu Jinglei. On the Satisfiability and Consistency for CP-nets[J]. Journal of Computer Research and Development, 2012, 49(4): 754-762.
    [7]Lu Yan, Hao Zhongxiao, Zhang Liang. An Algorithm for Checking Absolute Consistency of DTDs[J]. Journal of Computer Research and Development, 2005, 42(11): 1977-1982.
    [8]Xiong Jin, Fan Zhihua, Ma Jie, Tang Rongfeng, Li Hui, Meng Dan. Metadata Consistency in DCFS2[J]. Journal of Computer Research and Development, 2005, 42(6): 1019-1027.
    [9]Zhang Zhongping, Wang Chao, Zhu Yangyong. Constraint-Based Normalization Algorithms for XML Documents[J]. Journal of Computer Research and Development, 2005, 42(5): 755-764.
    [10]Lu Yan, Zhang Liang, Duan Qiyang, Shi Baile. DTD-Based XML Indexing[J]. Journal of Computer Research and Development, 2005, 42(1): 30-37.

Catalog

    Article views (825) PDF downloads (390) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return