Abstract:
In accordance with an embodiment, a method of authenticating images includes electronically receiving an anchor image and a query image, performing a feature point extraction of an anchor image, and performing a feature point extraction of a query image. The method also includes clustering feature points of the anchor image and feature points of the query image, where clustering includes determining matching feature points, determining outlier feature points, and excluding outlier feature points. Whether the anchor image is similar to the query image is determined based on a distance between the feature points of the anchor image and the feature points of the query image. If the anchor image is similar to the query image, possible tampered areas of the query image based on the outlier feature points are identified.
Abstract:
A digital data false alteration detection program causes a computer to execute (a) a step (S1) of dividing digital data into a plurality of smaller block data, (b) a step (S2) of extracting noise inherent to a digital data acquisition device for each of the small block data, (c) a step (S3) of calculating correlation of the noise between adjacent small block data, and (d) a step (S4) of detecting small block data having noise correlation lower than a level predetermined for the surrounding small block data, as falsely altered data.
Abstract:
Techniques described herein are generally related to steganalysis of suspect media. Steganalysis techniques may include receiving instances of suspect media as input for steganalytic processing. A first set of quantized blocks of data elements may be identified within the media, with this first set of blocks being eligible to be embedded with steganographic data. A second set of quantized blocks of data elements may be identified within the media, with this second set of blocks being ineligible to be embedded with steganographic data. The steganalysis techniques may requantize the first and second blocks. In turn, these techniques may compare statistics resulting from requantizing the first block with statistics resulting from requantizing the second block. The steganalysis techniques may then assess whether the first block of data elements is embedded with steganographic features based on how the statistics of the second blocks compare with the statistics of the first blocks.
Abstract:
A method and apparatus are provided for analyzing, identifying, and comparing images. The method can be used with any visually-displayed medium that is represented in any type of color space. An identified image can be authenticated, registered, marked, compared to another image, or recognized using the method and apparatus according to the present invention. At least one characteristic of an image's color space is selected and determined to generate a unique description of the image. This identification information is then used to compare different identified images to determine if they are identical according to a set of predetermined criteria. The predetermined criteria can be adjusted to permit the identification of images that are identical in part. In the preferred embodiment of the present invention, a software search application, such as a search engine or a spider, is used to locate and retrieve an image to be identified from an electronic network. A notification alarm is triggered when a duplicate image is located. In one embodiment, the present invention is implemented using a computer. One or more software applications, software modules, firmware, and hardware, or any combination thereof, are used to determine the identification information for the selected image characteristics, search for images, provide notification of identical images, and to generate a database of identified images.
Abstract:
In accordance with an embodiment, a method of authenticating images includes electronically receiving an anchor image and a query image, performing a feature point extraction of an anchor image, and performing a feature point extraction of a query image. The method also includes clustering feature points of the anchor image and feature points of the query image, where clustering includes determining matching feature points, determining outlier feature points, and excluding outlier feature points. Whether the anchor image is similar to the query image is determined based on a distance between the feature points of the anchor image and the feature points of the query image. If the anchor image is similar to the query image, possible tampered areas of the query image based on the outlier feature points are identified.
Abstract:
There is provided a method of identifying User-Created Content (UCC) using an image identifier, including combining a still image with the image identifier, requesting registration of UCC corresponding to the still image combined with the image identifier, and combining a UCC identifier, issued in response to the request, with the still image combined with the image identifier, thus generating final UCC.
Abstract:
Gegenstand der Erfindung ist ein Verfahren auf Behandlung von Bildern zwecks Analyse, wo das bild als in Reihen und in Spalten geordnete, ein Matrix bildende Punkte behandelt wird, ferner wird das Bild zu einer seinen Symmetrieachse im Verhältnis stellend auf ein symmetrisches Bild umgestaltet. Das Wesen der Erfindung ist, dass ein aus, mittels eines, das optische Licht oder irgendwelche andere Strahlung verwendenden, abbildenden Verfahrens erstellten, mit ihren ihre Farben gekennzeichneten Parametern bestimmten Punkten bestehendes Bild, oder ein angegebener Teil des Bildes, im Verhältnis zu einer seiner Symmetrieachse, gemäss eines bekannten mathematischen Algorithmus auf ein symmetrisches und ein antisymmetriches Bild zerlegt wird und dann werden die zwei Bilder dargestellt.
Abstract:
본 발명은 정지영상 서술자를 이용한 UCC 식별 방법 및 그 시스템에 관한 것으로, 방대한 양의 정지영상 데이터베이스 또는 인터넷상에서 유통되는 UCC나, 자기가 원하는 UCC를 고속은 물론 효율적으로 검색할 수 있고, 인터넷이나 재생장치의 종류에 따라 영상의 크기, 형태나 품질 등 본래의 특성이 변한 변형된 UCC의 경우에도 고속 검색 및 식별가능하다. 또한, 사용자가 기존 혹은 자신이 창작한 콘텐츠를 가공, 편집하더라도 이들 전체 혹은 일부분을 이용하여 원하는 UCC를 검색할 수 있고, 정지영상의 복사나 고의적인 공격에 의해 불법적으로 변형이 된 UCC도 검색 및 식별이 가능해짐에 따라 불법 콘텐츠의 유통을 예방 및 차단할 수 있다. UCC, 콘텐츠, 정지 영상 서술자