CN109815745B - Application program authorization method based on image signature - Google Patents

Application program authorization method based on image signature Download PDF

Info

Publication number
CN109815745B
CN109815745B CN201910025021.1A CN201910025021A CN109815745B CN 109815745 B CN109815745 B CN 109815745B CN 201910025021 A CN201910025021 A CN 201910025021A CN 109815745 B CN109815745 B CN 109815745B
Authority
CN
China
Prior art keywords
image
signature
authorization
application program
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910025021.1A
Other languages
Chinese (zh)
Other versions
CN109815745A (en
Inventor
余建兴
李政龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Kingsoft Digital Network Technology Co Ltd
Original Assignee
Zhuhai Kingsoft Digital Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Kingsoft Digital Network Technology Co Ltd filed Critical Zhuhai Kingsoft Digital Network Technology Co Ltd
Priority to CN201910025021.1A priority Critical patent/CN109815745B/en
Publication of CN109815745A publication Critical patent/CN109815745A/en
Application granted granted Critical
Publication of CN109815745B publication Critical patent/CN109815745B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Image Processing (AREA)

Abstract

The technical scheme of the invention comprises an application program authorization method based on image signature, which comprises an authorization request process and an authorization authentication process, wherein the authorization request process comprises the following steps: the request device sends an authorization request to an authorization server; the authorization server receives an authorization request, generates a first signature image serving as an account authorization permission certificate and sends the first signature image to the request equipment; the authorization authentication process includes: the application program receives a login authentication request; generating a signature to be authenticated according to the login authentication request; trying to decrypt the digital signature of the image to be detected, and if the image to be detected comprises the digital signature, comparing the digital signature with the signature to be authenticated; if the matching similarity is larger than the preset value, authorization is permitted, and if not, authorization is prohibited; if the image to be detected does not comprise the digital signature, authorization is forbidden; the decryption key is built in the application program and corresponds to the encryption key used by the authorization server.

Description

Application program authorization method based on image signature
Technical Field
The invention relates to an application program authorization method based on image signatures, and belongs to the field of information security.
Background
The game software is a special product, and generally authorization and authentication are performed on a game client in order to prevent illegal copying and piracy of the software and protect the benefits of game developers. The most common authentication method in the industry is the serial number, that is, the serial number character string of the game software purchased by the user is used as the registration certificate, and the serial number is input into the game client registration page. The verification module in the game will compare the serial number certificate A input by the user with the verification certificate B generated from the hardware information of the user computer. If the matching result is the same, the registration is passed, and a program branch after the registration is successful is operated, such as various software restrictions are removed; otherwise, prompting the verification failure information. Traditional serial number authentication involves two credentials, one on the user side and one on the computer side. The computer-side certificate is generally generated by a software program according to parameters of computer hardware (such as a motherboard, a network card, and a hard disk). The process runs in a computer memory and is easy to crack by tools. The assembly code of the registration code verification part of the software is obtained, for example, by disassembling and debugger tracing, and then the generation program of the certificate B, that is, the code of the verification certificate B generated according to the hardware information of the user computer, is found out by reverse engineering. When the generation program of the certificate is obtained, a user can make a registration code according to the hardware parameters of the computer by using the intercepted generation program under the condition of not purchasing the serial number, and further, the whole authorization mechanism is invalid due to the authentication of software. In addition, a part of cracking tools can directly intercept the information of the certificate B from the memory when the software calculates the verification certificate B from the hardware information of the user computer and matches the verification certificate B with the registration certificate A input by the user. Since the credential B is related to and relatively fixed with the computer hardware information, intercepting the credential means obtaining the true registration code. On the other hand, serial number authentication has a "one number for multiple uses", that is, a serial number is purchased for multiple times of authentication, and even the serial number is published on the network, so that all people can use the serial number authentication.
The authentication is used for authorization authentication by sending a verification request to the server side, and as the authentication is carried out at the server side but not in local computer software, the security of the authentication logic is improved compared with that of the traditional method, but the authentication process needs the participation of the server, and the load is large; and when the user's current computer is not networked, authentication is not possible.
Because the traditional image signature focuses on the visual characteristics of the image, as long as the input image content is the same, the generated image signature is the same or similar, so that a cracker can easily imitate the image with the same signature.
Disclosure of Invention
In order to solve the above problems, an object of the present invention is to provide an application program authorization method based on image signature, which uses an image signature technology, extracts image features based on image content, and encrypts the image features with an account ID to generate a digital signature, so that even if a cracker can imitate an image with the same image content, the cracker cannot pass verification; and the account ID in the digital signature prevents multiple account IDs from sharing the authorization.
The technical scheme adopted by the invention for solving the problems is as follows:
an application program authorization method based on image signature comprises an authorization request process and an authorization authentication process, wherein the authorization request process comprises the following steps:
the method comprises the steps that a request device sends an authorization request to an authorization server, wherein the authorization request comprises an account ID to be authorized for logging in an application program;
the method comprises the steps that an authorization server receives an authorization request, generates a first signature image serving as an account authorization permission certificate and sends the first signature image to a request device, wherein the digital signature of the first signature image comprises encrypted image characteristics and an account ID to be authorized;
the authorization authentication process can be completed offline or online on a device running the application program, and comprises the following steps:
the method comprises the steps that an application program receives a login authentication request, wherein the login authentication request comprises an account ID to be authenticated, a password corresponding to the account ID, and an image to be detected;
the application program generates a signature to be authenticated according to the login authentication request, wherein the signature to be authenticated comprises the image characteristics of the image to be detected and the ID of the account to be authenticated;
the application program tries to decrypt the digital signature of the image to be detected, and if the image to be detected comprises the digital signature, the digital signature is compared with the signature to be authenticated; if the matching similarity is larger than the preset value, authorization is permitted, and if not, authorization is prohibited; if the image to be detected does not comprise the digital signature, authorization is forbidden; the decryption key is built in the application program and corresponds to the encryption key used by the authorization server.
Further, the device running the application and the requesting device may be unified or separate.
Further, the generating process of the first signature image includes:
newly creating an image file or using an existing image file;
generating image features based on image content using an image signature algorithm;
encrypting and compressing the image characteristics and the ID of the account to be authorized by using a private key of an asymmetric encryption algorithm to obtain an encrypted signature;
and writing the encrypted signature into a meta information storage area of the image file to obtain a first signature image.
Further, the image content of the image file in the step of newly creating an image file or using an existing image file includes a randomly generated serial number string.
Further, the generating image features based on image content using an image signature algorithm includes: and processing the image by adopting two-dimensional discrete wavelet transform, and taking the obtained wavelet low-frequency coefficient as the image characteristic.
Further, the image preprocessing is further included before the image is processed by the two-dimensional discrete wavelet transform, and the image preprocessing specifically includes:
dividing the serial number image to obtain serial number image blocks with preset sizes and non-overlapping each other;
and (3) performing axial symmetry transformation on the segmented serial number image block, wherein the transformation relation is shown as the following formula:
P′(i,j)=P(i,j)-2 x-1
wherein, P (i, j) is the pixel gray value at the spatial position (i, j) in the image block, P' (i, j) is the pixel gray value after transformation at the spatial position (i, j) in the image block, and x is the bit number occupied by the pixel gray value of the single-point single color gamut;
converting the serial number image from an RGB color gamut into a YCbCr color gamut, wherein the conversion relation is shown as the following formula:
Figure BDA0001942156830000031
in the formula, Y represents brightness, i.e., a gray scale value, and Cr and Cb represent hue and saturation, respectively; cb reflects the difference between the blue part of the RGB input signal and the luminance value of the RGB signal; cr reflects the difference between the red portion of the RGB input signal and the luminance value of the RGB signal;
further, before the obtained wavelet low-frequency coefficient is used as an image feature, the method further includes performing feature coding on the wavelet low-frequency coefficient, and specifically includes:
converting all wavelet low-frequency coefficient values into 8-bit unsigned binary codes;
and intercepting the first two bits of the high bit of each 8-bit unsigned binary code to generate a binary code sequence, and taking the binary code sequence as the image characteristics.
Further, the asymmetric encryption algorithm adopts an RSA algorithm, the encryption key is a private key stored in the authorization server, and the decryption key is a public key built in the application program.
Further, the image features in the signature to be authenticated are obtained by extracting the image content of the image to be detected by adopting two-dimensional discrete wavelet transform.
Further, comparing the signature to be authenticated with the digital signature decrypted from the image to be detected, comprising:
and comparing the signature structures of the two, if the signature structures are the same, further comparing each structural part, and if not, forbidding authorization.
Further wherein comparing each constituent comprises:
firstly, account ID is accurately matched, if the account ID is completely consistent with the account ID, image features are further compared for similar matching, and if not, authorization is forbidden; specifically, the image features are similarly matched by the following formula:
Figure BDA0001942156830000032
in the formula, flag i Flag as the judgment result of the ith bit i =1 shows that the bit alignment is consistent, flag i If =0, it means that the bit alignment is inconsistent; refS i And RecS i The i-th bit of the image characteristic in the signature to be authenticated and the i-th bit of the image characteristic in the digital signature decrypted by the image to be detected are respectively;
calculating the matching similarity, specifically as follows:
Figure BDA0001942156830000033
where Num () is the frequency statistics function, rate Match Matching similarity; if the matching similarity is larger than the preset valueAuthorization is granted, otherwise authorization is prohibited.
The invention has the beneficial effects that: according to the application program authorization method based on the image signature, the two certificates of authorization authentication are unified on the same carrier, so that the situation that the two certificates are cracked due to separation is avoided, and the serial number image is difficult to counterfeit due to the addition of the encrypted signature; the encrypted signature contains the account ID, so that the multi-account ID sharing authorization can be prevented.
Drawings
FIG. 1 is a general flow diagram of a method of an embodiment of the invention;
FIG. 2 is a block diagram of a flow of pre-processing an image according to an embodiment of the invention;
FIG. 3 is a block diagram of a process for extracting image features using two-dimensional discrete wavelet transform according to an embodiment of the present invention;
FIG. 4 is a flow tree diagram for computing wavelet coefficients for a two-dimensional discrete wavelet transform in accordance with an embodiment of the present invention;
FIG. 5 is a schematic sub-band diagram after a first order wavelet transform according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of a sub-band after a second order wavelet transform in accordance with an embodiment of the present invention;
fig. 7 is a block diagram of the flow of comparing signatures in step S23 of the method according to the embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in detail with reference to the accompanying drawings and specific embodiments. The application program authorization method based on the image signature is suitable for the legal version authorization authentication of software.
Referring to fig. 1, the method for authorizing an application program based on an image signature of the present invention includes a step S1, an authorization request process and a step S2, an authorization authentication process, wherein the authorization request process includes:
s11, the request equipment sends an authorization request to an authorization server, wherein the authorization request comprises an account ID to be authorized, which logs in an application program;
s12, after receiving an authorization request, an authorization server generates a first signature image serving as an account authorization permission certificate and sends the first signature image to a request device, wherein a digital signature of the first signature image comprises encrypted image characteristics and an account ID to be authorized;
the authorization authentication process can be completed offline or online on a device running the application program, and comprises the following steps:
s21, the application program receives a login authentication request which comprises an account ID to be authenticated, a password corresponding to the account ID and an image to be detected;
s22, the application program generates a signature to be authenticated according to the login authentication request, wherein the signature to be authenticated comprises the image characteristics of the image to be detected and the ID of the account to be authenticated;
s23, the application program tries to decrypt the digital signature of the image to be detected, and if the image to be detected comprises the digital signature, the digital signature is compared with the signature to be authenticated; if the matching similarity is larger than the preset value, authorization is permitted, and if not, authorization is prohibited; if the image to be detected does not include the digital signature, authorization is forbidden; wherein the decryption key is embedded in the application and corresponds to the encryption key used by the authorization server.
Further, the device running the application may be unified or separate from the requesting device. When a user requests authorization, the user can purchase an image of an authorization license from an authorization party through equipment such as a mobile phone or a computer, and the requesting equipment can be equipment for running an application program or not; when a user purchases an image of an authorized license ticket from an authorized party, an account ID to be authorized needs to be provided.
Further, the process of the authorization server generating the first signature image includes:
newly creating an image file or using an existing image file;
generating image features based on image content using an image signature algorithm;
encrypting and compressing the image characteristics and the ID of the account to be authorized by using a private key of an asymmetric encryption algorithm to obtain an encrypted signature;
and writing the encrypted signature into a meta information storage area of the image file to obtain a first signature image.
Further, the image content of the image file in the step of newly creating an image file or using an existing image file includes a randomly generated serial number character string. In order to meet the habit of the user, a serial number character string is used as the image content, wherein the way of constructing the serial number and the serial number construction rule can be changed according to the requirement, and in one embodiment, a 16-bit character string with letters and numbers is generated as the serial number by specifically using a pseudo-random function in mathematics. The pseudo-random function employs a Meisen rotation algorithm that generates discrete uniformly distributed random numbers (where k = 16) in the range of [0,2^ k-1] based on a matrix linear recursive function over a finite binary field. And embedding the generated serial number character string into the image background in an overlaying mode.
Further, generating image features based on the image content using an image signature algorithm, comprising: and processing the image by adopting two-dimensional discrete wavelet transform, and taking the obtained wavelet low-frequency coefficient as the image characteristic.
Further, referring to fig. 2, before processing the image by using the two-dimensional discrete wavelet transform, the method further includes preprocessing the image, specifically including:
segmenting an image to obtain non-overlapping image blocks with preset sizes; if the size of each image block is M × M and the size of the image is N × N, then N is obtained 2 /M 2 An image block of P i Representing the ith image block.
And performing axisymmetric transformation on the divided image blocks, wherein the transformation relation is shown as the following formula:
P′(i,j)=P(i,j)-2 x-1
wherein, P (i, j) is the pixel gray scale value at the spatial position (i, j) in the image block, P' (i, j) is the pixel gray scale value after transformation at the spatial position (i, j) in the image block, and x is the bit number occupied by the pixel gray scale value of the single-point single color gamut;
converting the image from the RGB color gamut to the YCbCr color gamut, wherein the conversion relationship is shown as the following formula:
Figure BDA0001942156830000051
in the formula, Y represents brightness, i.e., a gray scale value, and Cr and Cb represent hue and saturation, respectively; cb reflects the difference between the blue part of the RGB input signal and the luminance value of the RGB signal; cr reflects the difference between the red part of the RGB input signal and the brightness value of the RGB signal; the RGB color gamut is converted into the YCbCr color gamut, the correlation among color components can be reduced, the coding efficiency is improved, and the conversion formula adopted is reversible, so that the lossless fidelity of image information is realized.
Referring to fig. 3, the two-dimensional discrete wavelet transform process comprises:
constructing a scale function and a wavelet function corresponding to the scale function, constructing a low-pass filter according to the scale function, and constructing a high-pass filter according to the wavelet function;
the multi-resolution analysis provides four basic requirements of a scale function, and wavelet functions corresponding to the four basic requirements can be defined by the scale function meeting the requirements, and common wavelet functions comprise Haar, meyer, morlet, duabechies and the like.
Realizing sub-band coding of the image through a high-pass filter and a low-pass filter;
specifically, as shown in fig. 4, x [ ] represents the input signal, g [ ] represents the low-pass filter, h [ ] represents the high-pass filter, m represents the row, n represents the column, and ↓ Q represents the downsampling of one sampling value per sampling point of Q,
1) High and low frequency signals are respectively separated from the image in the horizontal direction, and the high and low frequency signals are respectively expressed as follows:
Figure BDA0001942156830000061
and
Figure BDA0001942156830000062
2) Performing signal decomposition on the high-frequency signal and the low-frequency signal in the horizontal direction in the vertical direction respectively to obtain four signal subbands, including a low-frequency subband, a high-frequency subband in the vertical direction, a high-frequency subband in the horizontal direction, and a high-frequency subband in an oblique diagonal direction, as shown in fig. 5, an LL subband includes low-frequency information of an image and corresponds to a part with a gentle color change in the image; LH, HL, and HH are high frequency information in vertical, horizontal, and diagonal directions, respectively, and correspond to parts of the image where the color changes drastically, such as the outline of an object. The information representation of each subband is as follows:
Figure BDA0001942156830000063
Figure BDA0001942156830000064
Figure BDA0001942156830000065
Figure BDA0001942156830000066
3) The signal separation operations 1) -2) are repeated for the low frequency sub-band to further decompose the low frequency and high frequency information of the image, and as shown in fig. 6, the low frequency information LL shown in fig. 5 is further decomposed into LL2, LH2, HL2, and HH2 after being subjected to the second order wavelet transform.
Using Mallat algorithm to realize two-dimensional discrete wavelet transform to obtain wavelet coefficient spectrum;
the 5/3 lifting discrete wavelet transform is adopted, and the low-pass filter and the high-pass filter of the 5/3 lifting discrete wavelet transform are respectively provided with 5 taps and 3 taps, namely, 5 or 3 wavelet coefficient information of the upper layer is generated by generating one wavelet coefficient; the specific transformation formula is as follows:
Figure BDA0001942156830000067
Figure BDA0001942156830000068
Figure BDA0001942156830000069
Figure BDA00019421568300000610
Figure BDA0001942156830000071
Figure BDA0001942156830000072
x′ 2i-1 =s i
x′ 2i =d i
in the formula x i Is the input signal, x' i Is the output signal after the wavelet transform,
Figure BDA0001942156830000073
in the order of the odd part,
Figure BDA0001942156830000074
is an even part, tau is a prediction operator, and ν is an update operator; after wavelet transformation, a series of wavelet coefficients can be obtained, and images can be effectively represented by using the wavelet coefficients, namely, the images correspond to the features one by one, and the change of the images can bring the change of the features.
Further, considering that the image is generally compressed during the image transmission process, the general compression method may cause the image resolution to be reduced in exchange for a high compression ratio. In order to make the generated image features have certain robustness, especially consistent image features can be generated under the condition of reduced resolution, the method further comprises the step of performing feature coding on the wavelet low-frequency coefficient before the obtained wavelet low-frequency coefficient is used as the image features, and specifically comprises the following steps:
converting all wavelet low-frequency coefficient values into 8-bit unsigned binary codes;
and intercepting the first two bits of the high bit of each 8-bit unsigned binary code to generate a binary code sequence, and taking the binary code sequence as the image characteristics.
Here, since the obtained high-order region of the bits of the wavelet coefficient has strong stability under the condition of reduced resolution and even has certain deformation resistance, the change of the region is small in the pull-up and reduction transformation of the image, in one embodiment, if a value of a wavelet coefficient is 74, 8 unsigned bits are expressed as 01001001010, and 01 high-order bits are intercepted; and scanning LL, LH, HL and HH sub-bands in sequence by adopting a zigzag scanning mode, intercepting high two-bit values corresponding to all wavelet coefficients, and generating a binary sequence which is used as image characteristics.
Further, the asymmetric encryption algorithm adopts an RSA algorithm, the encryption key is a private key stored in the authorization server, and the decryption key is a public key built in the application program. The encryption algorithm can be selected according to needs for the encryption signature, in one embodiment, a reliable RSA asymmetric encryption algorithm is selected, a private key is used for encryption, a public key paired with the private key is used for decryption, and the private key is stored in an authorization server and is not public, so that a cracker cannot imitate an effective first signature image.
Further, the image characteristics in the signature to be authenticated are obtained by extracting the image content of the image to be detected by adopting two-dimensional discrete wavelet transform. When the image features of the image to be detected are extracted at the application program side, the used image extraction method is the same as the image extraction method applied when the authorization server generates the first signature image, and the two-dimensional discrete wavelet transform method is adopted, and is not described any more.
Referring to fig. 7, further, comparing the signature to be authenticated with the digital signature decrypted from the image to be detected includes:
and comparing the signature structures of the two, if the signature structures are the same, further comparing each structure part, and if not, forbidding authorization.
Further wherein comparing each constituent comprises:
firstly, account ID is accurately matched, if the account ID is completely consistent with the account ID, image features are further compared for similar matching, and if not, authorization is forbidden; specifically, the image features are subjected to similar matching through the following formula:
Figure BDA0001942156830000081
in the formula, flag i Flag as the judgment result of the ith bit i =1 shows that the bit alignment is consistent, flag i If =0, it means that the bit alignment is inconsistent; refS i And RecS i The i-th bit of the image characteristic in the signature to be authenticated and the i-th bit of the image characteristic in the digital signature decrypted by the image to be detected are respectively;
calculating the matching similarity as follows:
Figure BDA0001942156830000082
where Num () is the frequency statistics function, rate Match Matching similarity; if the matching similarity is larger than the preset value, authorization is permitted, and if not, authorization is prohibited. In order to ensure that the image verification has certain robustness, similar matching is adopted for matching of image features.
The above description is only a preferred embodiment of the present invention, and the present invention is not limited to the above embodiment, and the present invention shall fall within the protection scope of the present invention as long as the technical effects of the present invention are achieved by the same means. The invention is capable of other modifications and variations in its technical solution and/or its implementation, within the scope of protection of the invention.

Claims (10)

1. An application program authorization method based on image signature is characterized by comprising an authorization request process and an authorization authentication process, wherein the authorization request process comprises the following steps:
the method comprises the steps that a request device sends an authorization request to an authorization server, wherein the authorization request comprises an account ID to be authorized for logging in an application program;
the method comprises the steps that an authorization server receives an authorization request, generates a first signature image serving as an account authorization permission certificate and sends the first signature image to a request device, wherein the digital signature of the first signature image comprises encrypted image characteristics and an account ID to be authorized;
the generation process of the first signature image comprises the following steps: newly creating an image file or using an existing image file; generating image features based on image content using an image signature algorithm; encrypting and compressing the image characteristics and the ID of the account to be authorized by using a private key of an asymmetric encryption algorithm to obtain an encrypted signature; writing the encrypted signature into a meta-information storage area of the image file to obtain a first signature image;
the authorization authentication process is completed on the device running the application program through off-line or networking, and comprises the following steps:
the method comprises the steps that an application program receives a login authentication request, wherein the login authentication request comprises an account ID to be authenticated, a password corresponding to the account ID and an image to be detected;
the application program generates a signature to be authenticated according to the login authentication request, wherein the signature to be authenticated comprises the image characteristics of the image to be detected and the ID of the account to be authenticated;
the application program tries to decrypt the digital signature of the image to be detected, and if the image to be detected comprises the digital signature, the digital signature is compared with the signature to be authenticated; if the matching similarity is larger than the preset value, authorization is permitted, and if not, authorization is prohibited; if the image to be detected does not include the digital signature, authorization is forbidden; where the decryption key is placed in the application and corresponds to the encryption key used by the authorization server.
2. The image signature-based application program authorization method according to claim 1, characterized in that: the device running the application is unified or separated from the requesting device.
3. The image signature-based application authorization method according to claim 1, characterized in that the image content of the image file in the step of newly creating an image file or using an existing image file comprises a randomly generated serial number string.
4. The method for authorizing an application based on image signature as claimed in claim 1, wherein the generating image features based on image content using image signature algorithm comprises: and processing the image by two-dimensional discrete wavelet transform, and taking the obtained wavelet low-frequency coefficient as the image characteristic.
5. The method for authorizing an application program based on an image signature as claimed in claim 4, wherein the preprocessing of the image before the processing of the image by the two-dimensional discrete wavelet transform comprises:
dividing the serial number image to obtain serial number image blocks with preset sizes and non-overlapping each other;
and performing axisymmetric transformation on the segmented serial number image block, wherein the transformation relation is shown as the following formula:
P′(i,j)=P(i,j)-2 x-1
wherein, P (i, j) is the pixel gray scale value at the spatial position (i, j) in the image block, P' (i, j) is the pixel gray scale value after transformation at the spatial position (i, j) in the image block, and x is the bit number occupied by the pixel gray scale value of the single-point single color gamut;
converting the serial number image from an RGB color gamut into a YCbCr color gamut, wherein the conversion relation is shown as the following formula:
Figure FDA0003931571980000021
in the formula, Y represents brightness, i.e., a gray scale value, and Cr and Cb represent hue and saturation, respectively; cb reflects the difference between the blue part of the RGB input signal and the luminance value of the RGB signal; cr reflects the difference between the red portion of the RGB input signal and the luminance value of the RGB signal;
6. the method for authorizing an application program based on an image signature as claimed in claim 4, wherein before the step of using the obtained wavelet low-frequency coefficient as an image feature, the step of performing feature coding on the wavelet low-frequency coefficient further comprises:
converting all wavelet low-frequency coefficient values into 8-bit unsigned binary codes;
and intercepting the first two bits of the high bit of each 8-bit unsigned binary code to generate a binary code sequence, and taking the binary code sequence as the image characteristics.
7. The method for authorizing the application program based on the image signature as claimed in claim 1, wherein the asymmetric encryption algorithm adopts RSA algorithm, the encryption key is a private key stored in the authorization server, and the decryption key is a public key built in the application program.
8. The method for authorizing the application program based on the image signature as claimed in claim 1, wherein the image features in the signature to be authenticated are obtained by extracting the image content of the image to be detected by using two-dimensional discrete wavelet transform.
9. The method for authorizing an application based on image signature as claimed in claim 6, wherein comparing the signature to be authenticated with the digital signature decrypted from the image to be authenticated comprises:
and comparing the signature structures of the two, if the signature structures are the same, further comparing each structure part, and if not, forbidding authorization.
10. The image signature-based application authorization method of claim 9, wherein comparing each component comprises:
firstly, carrying out accurate matching on account ID, if the account ID is completely consistent, further comparing image characteristics for carrying out similar matching, and if not, forbidding authorization; the image features are similar matched through the following formula:
Figure FDA0003931571980000022
in the formula, flag i Flag as the judgment result of the ith bit i =1 shows that the bit alignment is consistent, flag i If =0, it means that the bit alignment is inconsistent; refS i And RecS i Respectively an ith bit of the image characteristic in the signature to be authenticated and an ith bit of the image characteristic in the digital signature decrypted by the image to be detected;
calculating the matching similarity as follows:
Figure FDA0003931571980000023
where Num () is the frequency statistics function, rate Match Matching similarity; and if the matching similarity is larger than the preset value, authorization is permitted, otherwise, authorization is forbidden.
CN201910025021.1A 2019-01-11 2019-01-11 Application program authorization method based on image signature Active CN109815745B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910025021.1A CN109815745B (en) 2019-01-11 2019-01-11 Application program authorization method based on image signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910025021.1A CN109815745B (en) 2019-01-11 2019-01-11 Application program authorization method based on image signature

Publications (2)

Publication Number Publication Date
CN109815745A CN109815745A (en) 2019-05-28
CN109815745B true CN109815745B (en) 2023-02-17

Family

ID=66603339

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910025021.1A Active CN109815745B (en) 2019-01-11 2019-01-11 Application program authorization method based on image signature

Country Status (1)

Country Link
CN (1) CN109815745B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102510333A (en) * 2011-09-30 2012-06-20 飞天诚信科技股份有限公司 Authorization method and system
CN102624739A (en) * 2012-03-30 2012-08-01 奇智软件(北京)有限公司 Authentication and authorization method and system applied to client platform
CN103078858A (en) * 2012-12-31 2013-05-01 上海同岩土木工程科技有限公司 Web service and signature certificate-based software trial authorization method
CN108268767A (en) * 2016-12-30 2018-07-10 北京国双科技有限公司 Web application authorization method and device
CN108881243A (en) * 2018-06-26 2018-11-23 晋商博创(北京)科技有限公司 (SuSE) Linux OS login authentication method, equipment, terminal and server based on CPK

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9621355B1 (en) * 2015-10-01 2017-04-11 Cisco Technology, Inc. Securely authorizing client applications on devices to hosted services

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102510333A (en) * 2011-09-30 2012-06-20 飞天诚信科技股份有限公司 Authorization method and system
CN102624739A (en) * 2012-03-30 2012-08-01 奇智软件(北京)有限公司 Authentication and authorization method and system applied to client platform
CN103078858A (en) * 2012-12-31 2013-05-01 上海同岩土木工程科技有限公司 Web service and signature certificate-based software trial authorization method
CN108268767A (en) * 2016-12-30 2018-07-10 北京国双科技有限公司 Web application authorization method and device
CN108881243A (en) * 2018-06-26 2018-11-23 晋商博创(北京)科技有限公司 (SuSE) Linux OS login authentication method, equipment, terminal and server based on CPK

Also Published As

Publication number Publication date
CN109815745A (en) 2019-05-28

Similar Documents

Publication Publication Date Title
Anand et al. Watermarking techniques for medical data authentication: a survey
Sharma et al. An adaptive color image watermarking using RDWT-SVD and artificial bee colony based quality metric strength factor optimization
Prasad et al. An RGB colour image steganography scheme using overlapping block-based pixel-value differencing
US10990660B2 (en) Device and methods for authenticating a user equipment
Singh et al. A multimodal biometric watermarking system for digital images in redundant discrete wavelet transform
Houssein et al. An image steganography algorithm using haar discrete wavelet transform with advanced encryption system
Umamageswari et al. Security in medical image communication with arnold's cat map method and reversible watermarking
Lu et al. Lossless information hiding in images
CN111984943B (en) DWT-SVD digital watermarking method based on artificial bee colony algorithm
Fan et al. A novel zero watermark optimization algorithm based on Gabor transform and discrete cosine transform
Bekkouch et al. Robust and reversible image watermarking scheme using combined DCT-DWT-SVD transforms
Guo et al. Hyperchaos permutation on false-positive-free SVD-based image watermarking
Gan et al. Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication
Wang et al. TPE-ISE: approximate thumbnail preserving encryption based on multilevel DWT information self-embedding
Mashhadi et al. A (t, n)-Secret image sharing with steganography based on Rook polynomial and LWE problem
Abrar et al. Secure Image Authentication Using Watermarking and Blockchain.
Soliman et al. An Efficient GCD-Based Cancelable Biometric Algorithm for Single and Multiple Biometrics.
Wu Quantization-based image authentication scheme using QR error correction
Helmy et al. A novel cancellable biometric recognition system based on Rubik’s cube technique for cyber-security applications
Devi et al. A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptography
CN109815745B (en) Application program authorization method based on image signature
Hajjaji et al. Combining DWT/KLT for secure transfer of color images
Sun et al. A Novel Image Steganography Based on Contourlet Transform and Hill Cipher.
Vaidya et al. Adaptive medical image watermarking system for e-health care applications
Yasmeen et al. A novel watermarking scheme based on discrete wavelet transform‐singular value decomposition

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 519000 Room 102, 202, 302 and 402, No. 325, Qiandao Ring Road, Tangjiawan Town, high tech Zone, Zhuhai City, Guangdong Province, Room 102 and 202, No. 327 and Room 302, No. 329

Applicant after: Zhuhai Jinshan Digital Network Technology Co.,Ltd.

Address before: 519000 building 3, Jinshan Software Park, 325 Qiandao Ring Road, Xiangzhou District, Zhuhai City, Guangdong Province

Applicant before: ZHUHAI KINGSOFT ONLINE GAME TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant