Because of the sensitivity of traditional hash algorithms to original data, it is not suitable for image content authentication. In this paper, we analyze and compare image hashing algorithms, realized a difference-value hashing algorithm (dHash), and apply the dHash algorithm to a blockchain-based image copyright protection system. dHash algorithm determines the similarity of images to ensure the uniqueness of image copyright.The test shows that the dHash algorithm has high accuracy and faster speed of images with Gaussian noise.
With the popularity of high-precision printing equipment, leading to the widespread spread of pirated products. Because of some disadvantages in traditional anti-counterfeiting printing, a half-tone anti-counterfeiting image generation algorithm based on microstructure dots is proposed. First, the word library automatically generates the character word library containing the grayscale and morphological differences, and then matches and replaces the image according to the similarity of the image, so as to realize the generation of the anti-counterfeiting image. Experimental results show that the anti-counterfeiting image based on microstructure dot generated by this algorithm is visually small from the original image, and after the anti-counterfeiting image is enlarged, the embedded micro characters are clearly visible, and the algorithm has broad application prospects in packaging anti-counterfeiting.
Visual cryptography is a cryptographic technique which allows visual information to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. This paper proposes a schema of information hiding within the method of visual cryptography. The gray image is changed into two halftone images via the different dither matrixes respectively, and the secret binary pixels are encoded into shares. The secret information can be restored by stacking the different shared halftone images together. Simulation results show that the secret binary image can be decoded efficiently.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.