New! View global litigation for patent families

CN105138873A - Image-based safety certification method and device - Google Patents

Image-based safety certification method and device Download PDF

Info

Publication number
CN105138873A
CN105138873A CN 201510516025 CN201510516025A CN105138873A CN 105138873 A CN105138873 A CN 105138873A CN 201510516025 CN201510516025 CN 201510516025 CN 201510516025 A CN201510516025 A CN 201510516025A CN 105138873 A CN105138873 A CN 105138873A
Authority
CN
Grant status
Application
Patent type
Prior art keywords
file
images
feature
safety
watermark
Prior art date
Application number
CN 201510516025
Other languages
Chinese (zh)
Inventor
刘超
Original Assignee
浪潮(北京)电子信息产业有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Abstract

The invention discloses an image-based safety certification method and device. The method comprises the steps that images are collected to generate a first scanning copy, safety certification is carried out on the first scanning copy, a first file feature code of the images is obtained through calculation, and/or a first watermark of the images is generated according to image information, so that the first file feature code and/or the first watermark are/is stored in a file management system; images are collected to generate a second scanning copy, safety certification is carried out on the second canning copy, a second file feature code of the images is obtained through calculation, and/or a second watermark of the images is generated according to image information; after the second file feature code and/or the second watermark are/is the same as the first file feature code and/or the first watermark, images in the file management system are allowed to be processed. Safety and reliability of file management are improved.

Description

一种基于图像的安全认证方法和装置 A secure authentication method, and an image based on

技术领域 FIELD

[0001] 本发明涉及安全认证技术领域,尤指一种基于图像的安全认证方法和装置。 [0001] The present invention relates to the field of security authentication technology, particularly to a method and apparatus of secure authentication based on an image.

背景技术 Background technique

[0002] 随着电子信息技术的发展,许多传统的工作流程及工作方式都向电子化、流程化的方向发展,尤其在档案管理领域,传统的纸质文档和票据保存及认证方法已经满足不了海量信息的存储及使用。 [0002] With the development of electronic information technology, many traditional work processes and working methods have developed in the direction of electronic, process-oriented, especially in the field of archives management, traditional paper documents and notes preservation and authentication method has failed to meet storage and use of vast amounts of information. 档案电子化的发展浪潮中,电子信息技术起到了关键作用。 Development of the wave file electronically, the electronic information technology has played a key role. 利用计算机和网络等现代信息手段对档案和票据进行收集、整理、存储和加工,建立数据库,提供高效信息检索功能。 The use of modern means of information such as computer and network files and notes on the collection, collation, storage and processing, establishment of a database to provide efficient information retrieval.

[0003] 但是,现有的档案管理方法往往依赖于单一的人员合法性认证,并不能真正做到档案和票据等电子化过程中的安全可靠。 [0003] However, existing records management methods often rely on a single legality certified personnel, and can not truly electronic files and notes and other process safety and reliability.

发明内容 SUMMARY

[0004] 为了解决上述技术问题,本发明提供了一种基于图像的安全认证方法和装置,提高档案管理的安全性和可靠性。 [0004] To solve the above problems, the present invention provides safety and reliability file management based on security authentication method and apparatus of an image, is improved.

[0005] 为了达到本发明目的,本发明提供了一种基于图像的安全认证方法,包括:对图像进行采集生成第一扫描件,对所述第一扫描件进行安全认证计算得出所述图像的第一文件特征码,和/或,根据图像信息生成所述图像的第一水印,将所述第一文件特征码和/或所述第一水印保存在档案管理系统中;对所述图像进行采集生成第二扫描件,对所述第二扫描件进行安全认证计算得出计算图像的第二文件特征码,和/或,根据图像信息生成所述图像的第二水印;确定第二文件特征码和/或第二水印与档案管理系统保存的第一文件特征码和/或第一水印相同后,允许对档案管理系统中的所述图像进行处理。 [0005] To achieve the object of the present invention, the present invention provides a method for secure image authentication, including those based on: a first image acquisition scan generating member, the first scanning member for secure authentication of the image is calculated a first document signature, and / or, in accordance with the first image information to generate the watermark image, the and / or the first watermark signature the first file in the file storage management system; the image generating a second acquisition member scanning, the second scanning member for secure authentication signature derived calculate a second document image is calculated, and / or, according to the image information of the second image to generate the watermark; determining a second file stored signatures and / or the second watermark document and file management system of the first pattern and / or the same as the first watermark, allowing the image file management system for processing.

[0006] 进一步地,所述对所述第一扫描件进行安全认证计算得出所述图像的第一文件特征码,所述对所述第二扫描件进行安全认证计算得出计算图像的第二文件特征码,具体为:对第一扫描件和第二扫描件的所有像素点信息进行MD5加密,并通过摘要算法分别计算出第一扫描件的第一文件特征码和第二扫描件的第二文件特征码。 [0006] Furthermore, the first security authentication calculation of the derived image signature file to the first scanning element, the authentication for the first security image, calculated for the second scanning member two signature file, specifically: for a first scan of the MD5 encryption members and all members of the second scan pixel information, and are calculated by the digest algorithm first file of the first scan and the second scan pattern piece member The second file signatures.

[0007] 进一步地,所述根据图像信息生成所述图像的第一水印,所述根据图像信息生成所述图像的第二水印,具体为:通过对图像中的相同信息,并通过Linux标准规范LSB算法,分别生成第一扫描件的第一水印和第二扫描件的第二水印。 [0007] Further, according to the information of the first image to generate the watermark image, the second watermark in accordance with image information to generate the image, specifically: by the same information in the image, by Linux and standards LSB algorithm to generate a first watermark and a second watermark in a second scanning element scanning the first member.

[0008] 进一步地,所述对所述图像进行采集生成第二扫描件之前,还包括:设置用户的安全认证方式,所述安全认证方式包括用户名、密码、指纹和脸部特征扫描中的一种或几种;根据设置的安全认证方式确定用户合法后,允许用户进入档案管理系统。 [0008] Further, before the collection to generate a second scan of the image member, further comprising: setting the user authentication security, the security authentication method comprises a user name, password, fingerprint and facial feature scans one or more; provided according to the security authentication to determine valid user, allowing the user to enter the file management system.

[0009] 进一步地,所述第一文件特征码和/或第一水印与所述图像进行绑定,并将所述图像与绑定的第一文件特征码和/或第一水印保存在档案管理系统中。 [0009] Furthermore, the first file signature for binding and / or the first watermark image and the first image file and the bound signatures and / or the first watermark is kept in the archives management systems.

[0010] 进一步地,所述确定第二文件特征码和/或第二水印与档案管理系统保存的第一文件特征码和/或第一水印相同后,允许对档案管理系统中的所述图像进行处理,具体为:在档案管理系统查询和所述图像对应的第一文件特征码和/或第一水印,将第一文件特征码与第二文件特征码进行比对,和/或第一水印与第二水印进行比对,如果相同,则允许对档案管理系统中的所述图像进行处理 [0010] Further, the second determination pattern file saved and / or the second watermark document and file management system of the first pattern and / or after the first watermark same, allowing the image File Management System processing, specifically: in the file management system query and the document image corresponding to the first pattern and / or the first watermark, the first file signature for comparison with a second signature file, and / or the first watermark and second watermark for comparison, if the same, allows the image file management system for processing

[0011] 本发明还提供了一种基于图像的安全认证装置,包括:采集模块,用于对图像进行采集生成第一扫描件和第二扫描件;第一处理模块,用于对所述采集模块生成的第一扫描件进行安全认证计算得出所述图像的第一文件特征码,和/或,根据图像信息生成所述图像的第一水印,将所述第一文件特征码和/或所述第一水印保存在档案管理系统中;对所述采集模块生成的第二扫描件进行安全认证计算得出计算图像的第二文件特征码,和/或,根据图像信息生成所述图像的第二水印;第二判断模块,用于判断第二文件特征码和/或第二水印与档案管理系统保存的第一文件特征码和/或第一水印是否相同;第二处理模块,用于如果所述第二判断模块判断出相同后,允许对档案管理系统中的所述图像进行处理。 [0011] The present invention also provides an image-based security authentication apparatus, comprising: a collection module, for generating a first image acquisition scan and the second scanning element; a first processing module, configured to collect the the first scanning member to perform security authentication module generates the calculated signature of the image of the first document, and / or, in accordance with the first image information to generate the watermark image, the first file signature and / or the first watermark in the file storage management system; second scanning member in said acquisition module generates second calculated authentication security document signature image is calculated, and / or generates image information of the image the second watermark; a second determining module configured to determine a second signature files and / or the second watermark and file management system to save a first file signature and / or the first watermark are the same; a second processing module configured to if the second determining module determines that the same, allowing the image file management system for processing.

[0012] 进一步地,所述第一处理模块,具体用于:对第一扫描件和第二扫描件的所有像素点信息进行MD5加密,并通过摘要算法分别计算出第一扫描件的第一文件特征码和第二扫描件的第二文件特征码;通过对图像中的相同信息,并通过Linux标准规范LSB算法,分别生成第一扫描件的第一水印和第二扫描件的第二水印。 The first member and the first scan all of the pixels of the second scanning member MD5 encryption information, and calculates a first scanning element through the digest algorithm are: [0012] Furthermore, the first processing module, configured to second file pattern and second scanning pattern file member; by the same information in the image, and Linux standard specification LSB algorithm generates a first watermark in a first scanning and the second scanning element member, a second watermark .

[0013] 进一步地,所述装置还包括:设置模块,用于设置用户的安全认证方式,所述安全认证方式包括用户名、密码、指纹和脸部特征扫描中的一种或几种; [0013] Preferably, said apparatus further comprising: a setting module configured to set a user authentication security, the secure authentication comprising one or several user name, password, fingerprint and facial feature scans;

[0014] 第一判断模块,用于根据设置的安全认证方式判断用户是否合法;所述第二处理模块,还用于在所述第一判断模块判断合法后,允许用户进入档案管理系统。 [0014] a first determining module, according to the security authentication mode setting is determined whether the user is valid; the second processing module is further configured to, after the first judging module determines that method, allows the user to enter the file management system.

[0015] 进一步地,所述第一处理模块,还用于:将所述第一文件特征码和/或第一水印与所述图像进行绑定,并将所述图像与绑定的第一文件特征码和/或第一水印保存在档案管理系统中;所述第二判断模块,具体用于:在档案管理系统查询和所述图像对应的第一文件特征码和/或第一水印,将第一文件特征码与第二文件特征码进行比对,和/或第一水印与第二水印进行比对。 [0015] Furthermore, the first processing module is further configured to: the first file signature and / or the first watermark image with the binding and the binding of the first image and file signatures and / or the first watermark in the file storage management system; the second determining module is configured to: query in the file management system, and a first document signature and / or the image corresponding to a first watermark, the first file signature with the signature file to compare a second comparison, and / or the first watermark and a second watermark.

[0016]与现有技术相比,本发明包括对图像进行采集生成第一扫描件,对所述第一扫描件进行安全认证计算得出所述图像的第一文件特征码,和/或,根据图像信息生成所述图像的第一水印,将所述第一文件特征码和/或所述第一水印保存在档案管理系统中;对所述图像进行采集生成第二扫描件,对所述第二扫描件进行安全认证计算得出计算图像的第二文件特征码,和/或,根据图像信息生成所述图像的第二水印;确定第二文件特征码和/或第二水印与档案管理系统保存的第一文件特征码和/或第一水印相同后,允许对档案管理系统中的所述图像进行处理。 [0016] Compared with the prior art, the present invention includes an image acquisition scan to generate a first member, the first scanning member for secure authentication of the image file a first calculated signature, and / or, the first image information to generate the watermark image, the and / or the first watermark signature the first file in the file storage management system; the acquired image to generate a second scanning member, the a second scanning element for secure authentication, calculated pattern image of the second document, and / or a second watermark in accordance with image information generation of the image; determining a second signature file and / or the second watermark and file management after the same storage system of the first file signature and / or the first watermark, allowing the image file management system for processing. 本发明除了对用户进行安全认证,还通过图像采集阶段和图像认证阶段分别采集图像的扫描件,根据扫描件分别生成文件特征码和/或水印,并将两阶段的文件特征码和/或水印进行比对,确认相同后才能进入档案管理系统对图像进行处理,如此,提高了档案管理的安全性和可靠性。 The present invention, in addition to the user authentication security, but also by the image acquisition phase and an authentication phase images were acquired in a scanned image, generating a signature file and / or watermarks according to the scanning member, respectively, and the two-phase signature of the file and / or watermarks for comparison, the same confirmation to enter the file management system for image processing, and so improve the safety and reliability of records management.

[0017] 本发明的其它特征和优点将在随后的说明书中阐述,并且,部分地从说明书中变得显而易见,或者通过实施本发明而了解。 [0017] Other features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or learned by practice of the present invention. 本发明的目的和其他优点可通过在说明书、权利要求书以及附图中所特别指出的结构来实现和获得。 The objectives and other advantages of the present invention can be in the specification, the drawings, and particularly pointed out in the structure realized and attained by the claims.

附图说明 BRIEF DESCRIPTION

[0018] 附图用来提供对本发明技术方案的进一步理解,并且构成说明书的一部分,与本申请的实施例一起用于解释本发明的技术方案,并不构成对本发明技术方案的限制。 [0018] The accompanying drawings provide a further understanding of aspect of the present invention, and constitute part of the specification, embodiments of the present application, serve to explain the technical solution of the present invention, not to limit the technical solution of the present invention.

[0019] 图1是本发明的一种实施例中基于图像的安全认证方法的流程示意图。 [0019] FIG. 1 is a schematic flow diagram of embodiments of the present invention, the image-based security authentication method embodiment.

[0020]图2是本发明的一种实施例中基于图像的安全认证装置的结构示意图。 [0020] FIG. 2 is a schematic structural diagram of the present invention is based on security authentication apparatus according to the embodiment of the image.

具体实施方式 detailed description

[0021] 为使本发明的目的、技术方案和优点更加清楚明白,下文中将结合附图对本发明的实施例进行详细说明。 [0021] To make the objectives, technical solutions, and advantages of the present invention will become apparent from, the accompanying drawings hereinafter in conjunction with embodiments of the present invention will be described in detail. 需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互任意组合。 Incidentally, in the case of no conflict, embodiments and features of the embodiments of the present application may be arbitrarily combined with each other.

[0022] 在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的计算机系统中执行。 [0022] The steps shown in the flowchart drawings can be executed in a computer system a set of computer executable instructions. 并且,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。 In addition, although in the flowchart shown in a logical order, but in some cases, the steps shown or may be performed in a different order than described herein.

[0023]图1是本发明的一种实施例中基于图像的安全认证方法的流程示意图。 [0023] FIG. 1 is a schematic flow diagram of embodiments of the present invention, the image-based security authentication method embodiment. 如图1所示,该安全认证的过程包括图像采集阶段和图像认证阶段: As shown in FIG. 1, the security authentication process comprising an image acquisition phase and an image authentication phase:

[0024] 步骤101,对图像进行采集生成第一扫描件,对第一扫描件进行安全认证计算得出该图像的第一文件特征码,和/或,根据图像中的信息生成该图像的第一水印,将第一文件特征码和/或第一水印保存在档案管理系统中。 [0024] Step 101, the image acquisition scan to generate a first member, a first scanning element is calculated first security authentication signature of the image file, and / or to generate a first image based on the image information a watermark, the first document signature and / or the first watermark is stored in file management systems.

[0025] 本步骤属于图像采集阶段,在本步骤中,对档案和票据等图像进行采集生成第一扫描件,对第一扫描件用预定义好的认证方法或策略进行安全认证计算,得出该图像的第一文件特征码,例如对扫描件的所有像素点信息进行MD5加密,并通过摘要算法计算出第一文件特征码;和/或,通过图像中的关键特征信息按照指定算法生成第一水印,例如对用户关心的关键信息如日期,签名等用Linux标准规范(LSB,Linux Standards Base)算法生成第一水印。 [0025] The present step belonging to the image acquisition phase, in this step, the bills files and image acquisition scan generating a first member, a first scanning element for security authentication calculation using the pre-defined authentication method or strategy, derived a first signature of the image file, for example, all the pixels of a scanned information is encrypted MD5, and the first file calculated by the signature digest algorithm; and / or, according to a specified algorithm to generate a first key feature in the image information a watermark, such as key information of interest to users, such as date, signature with Linux standard Base (LSB, Linux standards Base) algorithm to generate a first watermark. 将图像与第一文件特征码和/或第一水印进行绑定,将图像与绑定的第一文件特征码和/或第一水印保存在档案管理系统的数据库中。 The image file signatures with the first and / or the first watermark binding, the binding of the first image and the file signatures and / or the first watermark stored in the database file management systems.

[0026] 步骤102,设置用户的安全认证方式。 [0026] Step 102, provided the user's security authentication.

[0027] 在本步骤中,可以设置用户名、密码、指纹和脸部特征扫描等的一种或几种作为安全认证方式。 [0027] In this step, the set user name, password, fingerprint and facial features of one or several scanning as a security authentication.

[0028] 在本实施例中,先进行步骤101,再进行步骤102,当然其他顺序也可以,例如,先进行步骤102,再进行步骤101,或者在进行步骤101的扫描阶段进行步骤102,在此不限定。 [0028] In the present embodiment, the first step 101, step 102 then, of course, other sequences may be, for example, to step 102, and then proceeds to step 101, or after step 101 is a step scan stage 102, the this is not limited.

[0029] 步骤103,根据设置的安全认证方式判断用户是否合法,如果合法,进行步骤104 ;如果不合法,拒绝用户进入档案管理系统。 [0029] Step 103, the authentication mode according to the security set is determined whether the user is valid, if valid, step 104; if not valid, deny access to the file management system.

[0030] 在本步骤中,对需要进入档案管理系统的用户进行安全认证,例如根据设置的用户名、密码、指纹和/或脸部特征扫描等方式进行安全认证。 [0030] In this step, the user needs to enter the file management system to perform security authentication, for example, secure authentication of the user name is set, a password, fingerprints and / or facial feature scan mode. 如果安全认证通过,则进行后续的步骤;如果安全认证不通过,则无法进入档案管理系统。 If security authentication is passed, the subsequent steps are carried out; if the security authentication is not passed, you can not enter records management systems.

[0031] 步骤104,对图像进行采集生成第二扫描件,对第二扫描件进行安全认证计算得出该图像的第二文件特征码,和/或,根据图像中的信息生成该图像的第二水印。 [0031] Step 104, for generating a second image acquisition scan element, a second scanning element calculated second security authentication signature of the image file, and / or to generate a first image based on the image information two watermarks.

[0032] 本步骤属于图像认证阶段,在本步骤中,对档案和票据等图像进行采集生成第二扫描件,对第二扫描件用和图像采集阶段相同的认证方法或策略进行安全认证计算,得出该图像的第二文件特征码,例如对扫描件的所有像素点信息进行MD5加密,并通过摘要算法计算出第二文件特征码;和/或,通过和图像采集阶段相同的图像中的关键特征信息按照指定算法生成第二水印,例如对用户关心的关键信息如日期,签名等用Linux标准规范(LSB,Linux Standards Base)算法生成第二水印。 [0032] The present step belonging to the image authentication stage, in this step, the bills archives and generating a second image acquisition scan element, the same members of the second scanning and the image acquisition phase with authentication method or strategy for secure authentication calculation, obtain a second signature of the image file, for example, all the pixels of a scanned information is encrypted MD5, and calculates the signature file by a second digest algorithm; and / or, through the image acquisition phase and an image in the same generating a second watermark key feature information according to the specified algorithm, for example, key information for the user of interest, such as date, signature using Linux standards (LSB, Linux standards Base) algorithm for generating a second watermark.

[0033] 步骤105,判断第二文件特征码和/或第二水印与档案管理系统保存的第一文件特征码和/或第一水印是否相同,如果相同,允许用户对档案管理系统中的图像进行处理;如果不相同,拒绝用户对档案管理系统中的图像进行处理。 [0033] Step 105, determines whether the second document signature and / or the second watermark and file management system to save a first file signature and / or the first watermark is the same, if the same, allows the user image File Management System processing; if not identical, the user is denied file management system for image processing.

[0034] 在本步骤中,在档案管理系统查询和图像对应的第一文件特征码和/或第一水印,将第一文件特征码与第二文件特征码进行比对,和/或第一水印与第二水印进行比对,如果相同,允许用户对档案管理系统中的图像进行处理;如果不相同,拒绝用户对档案管理系统中的图像进行处理。 [0034] In this step, in the file management system and the query image corresponding to the first document signature and / or the first watermark, the first file signature for comparison with a second signature file, and / or the first watermark and second watermark for comparison, if the same, allows the user to file management system of image processing; if not identical, the user is denied file management system for image processing.

[0035] 和现有技术相比,本发明在对用户进行安全认证的基础上,还通过对档案管理系统中的图像进行安全认证,提高了档案管理的安全性和可靠性。 [0035] and compared with the prior art, the present invention is the basis of security authentication on the user, through secure authentication of the image file management system, to improve the safety and reliability of the file management.

[0036]图2是本发明的一种实施例中基于图像的安全认证装置的结构示意图。 [0036] FIG. 2 is a schematic structural diagram of the present invention is based on security authentication apparatus according to the embodiment of the image. 如图2所示,包括: 2, comprising:

[0037] 采集模块,用于对图像进行采集生成第一扫描件和第二扫描件; [0037] The acquisition module for generating a first image acquisition scan and the second scanning element;

[0038] 第一处理模块,用于对第一扫描件进行安全认证计算得出该图像的第一文件特征码,和/或,根据图像中的信息生成该图像的第一水印;对第二扫描件进行安全认证得出该图像的第二文件特征码,和/或,根据图像中的信息生成该图像的第二水印; [0038] The first processing module, a first scanning member configured to calculate a first security authentication signature of the image file, and / or the first watermark information in the image to generate the image according to the results; second scanning a second document element of the image derived security authentication signature, and / or information in the image of the watermark generating a second image;

[0039] 设置模块,用于设置用户的安全认证方式; [0039] The setting module configured to set a user authentication security;

[0040] 第一判断模块,用于根据设置的安全认证方式判断用户是否合法; [0040] a first determining module, according to the security authentication mode setting determines whether the user is legal;

[0041] 第二判断模块,用于在第一判断模块确定合法后,判断第一文件特征码与第二文件特征码,和/或,第一水印与第二水印是否相同; [0041] The second determining module, configured to, after the first judging module determines legitimate, determining a first file and the second file signature pattern, and / or, a first watermark and a second watermark is the same;

[0042] 第二处理模块,用于在第一判断模块确定不合法后,拒绝用户进入档案管理系统;在第二判断模块确定相同后,允许用户对档案管理系统中的图像进行处理;在第二判断模块确定不相同后,拒绝用户对档案管理系统中的图像进行处理。 [0042] The second processing module, for, after the first judging module determines not legitimate, deny access to the file management system; after the second judging module determines the same, allowing the user to file management system of image processing; the first after the determination module determines two are not the same, the user is denied on the file management system for image processing.

[0043] 本发明的安全认证装置涉及到的技术细节和安全认证方法类似,故在此不赘述。 [0043] The security authentication device of the invention similar to the technical details related to the security and authentication methods, it is not repeated herein.

[0044] 在本发明中,除了对用户进行安全认证,还通过图像采集阶段和图像认证阶段分别采集图像的扫描件,根据扫描件分别生成文件特征码和/或水印,并将两阶段的文件特征码和/或水印进行比对,确认相同后才能进入档案管理系统对图像进行处理,如此,提高了档案管理的安全性和可靠性。 [0044] In the present invention, in addition to the user authentication security, but also by the image acquisition phase and an authentication phase images were acquired in a scanned image, generating a signature file and / or watermarks according to the scanning member, respectively, and the two-stage files signature and / or watermark than to confirm the same to enter the file management system for image processing, and so improve the safety and reliability of records management.

[0045] 虽然本发明所揭露的实施方式如上,但所述的内容仅为便于理解本发明而采用的实施方式,并非用以限定本发明。 [0045] While the disclosed embodiment of the present invention described above, but the embodiment is provided only to facilitate understanding of the invention embodiment is employed, the present invention is not limited thereto. 任何本发明所属领域内的技术人员,在不脱离本发明所揭露的精神和范围的前提下,可以在实施的形式及细节上进行任何的修改与变化,但本发明的专利保护范围,仍须以所附的权利要求书所界定的范围为准。 Any skilled person in the art the present invention pertains, without departing from the spirit and scope of the disclosed invention may be made any modifications and changes in form and detail of the embodiments, but the scope of the present invention patent, still in the appended claims define the scope of equivalents.

Claims (10)

1.一种基于图像的安全认证方法,其特征在于,包括: 对图像进行采集生成第一扫描件,对所述第一扫描件进行安全认证计算得出所述图像的第一文件特征码,和/或,根据图像信息生成所述图像的第一水印,将所述第一文件特征码和/或所述第一水印保存在档案管理系统中; 对所述图像进行采集生成第二扫描件,对所述第二扫描件进行安全认证计算得出计算图像的第二文件特征码,和/或,根据图像信息生成所述图像的第二水印; 确定第二文件特征码和/或第二水印与档案管理系统保存的第一文件特征码和/或第一水印相同后,允许对档案管理系统中的所述图像进行处理。 A secure authentication method for an image-based, characterized by comprising: generating a first image acquisition scan element, the first scanning member for secure authentication of the image file is calculated a first signature, and / or, in accordance with the first image information to generate the watermark image, the and / or the first watermark pattern stored in the first file in the file management system; generating a second acquisition member to said image scanning , security authentication calculation of the second scanning element obtained image is calculated second signature file, and / or, according to the image information of the second image to generate the watermark; determining a second signature file and / or the second after saving the same watermark file management system of the first file signature and / or the first watermark, allowing the image file management system for processing.
2.根据权利要求1所述的基于图像的安全认证方法,其特征在于,所述对所述第一扫描件进行安全认证计算得出所述图像的第一文件特征码,所述对所述第二扫描件进行安全认证计算得出计算图像的第二文件特征码,具体为: 对第一扫描件和第二扫描件的所有像素点信息进行MD5加密,并通过摘要算法分别计算出第一扫描件的第一文件特征码和第二扫描件的第二文件特征码。 The security authentication method as claimed in claim image-based, wherein said 1, the calculated secure authentication of said first scanning element obtained first document signature of the image, the said a second scanning element calculate a second security authentication signature file obtained image is calculated, specifically: a first scan of all pixels of the second member and the scanning element MD5 encryption information, and calculates a first pass digest algorithm, respectively second file signature pattern file first and second scanning member scanning member.
3.根据权利要求1所述的基于图像的安全认证方法,其特征在于,所述根据图像信息生成所述图像的第一水印,所述根据图像信息生成所述图像的第二水印,具体为: 通过对图像中的相同信息,并通过Linux标准规范LSB算法,分别生成第一扫描件的第一水印和第二扫描件的第二水印。 3. The image-based security authentication method, wherein according to claim 1, according to the image of the first image to generate the watermark information, the watermark generating a second image information of the image, specifically : by the same information in the image, and Linux standard specification LSB algorithm, generates the second scan the first watermark watermark first member and the second scanning member.
4.根据权利要求1所述的基于图像的安全认证方法,其特征在于,所述对所述图像进行采集生成第二扫描件之前,还包括: 设置用户的安全认证方式,所述安全认证方式包括用户名、密码、指纹和脸部特征扫描中的一种或几种; 根据设置的安全认证方式确定用户合法后,允许用户进入档案管理系统。 4. The image-based security authentication method, wherein according to claim 1, said second scan prior to acquisition of the image generating device further comprising: a user authentication security setting, the security authentication It comprises one or more user name, password, fingerprint and facial feature scans; valid after determining that the user authentication according to the security provided, allowing the user to enter the file management system.
5.根据权利要求1〜4中任一项所述的基于图像的安全认证方法,其特征在于,所述第一文件特征码和/或第一水印与所述图像进行绑定,并将所述图像与绑定的第一文件特征码和/或第一水印保存在档案管理系统中。 According to any of claims 1 ~ 4 The security authentication method based on an image, wherein the first file signature and / or the first watermark image with the binding, and the first file signature and / or said first image and the watermark is stored in the file management binding system.
6.根据权利要求5所述的基于图像的安全认证方法,其特征在于,所述确定第二文件特征码和/或第二水印与档案管理系统保存的第一文件特征码和/或第一水印相同后,允许对档案管理系统中的所述图像进行处理,具体为: 在档案管理系统查询和所述图像对应的第一文件特征码和/或第一水印,将第一文件特征码与第二文件特征码进行比对,和/或第一水印与第二水印进行比对,如果相同,则允许对档案管理系统中的所述图像进行处理。 The security authentication method based on the image, wherein the 5, wherein the determining a second file stored signatures and / or the second watermark document and file management system of the first pattern and / or the first claim after the same watermark, allowing the file management system of image processing, in particular: in a first file management system queries and file signatures and / or the first watermark corresponding to the image, the first file signature and second file signature for comparison were aligned, and / or the first watermark and a second watermark, if the same, allows the image file management system for processing.
7.—种基于图像的安全认证装置,其特征在于,包括: 采集模块,用于对图像进行采集生成第一扫描件和第二扫描件; 第一处理模块,用于对所述采集模块生成的第一扫描件进行安全认证计算得出所述图像的第一文件特征码,和/或,根据图像信息生成所述图像的第一水印,将所述第一文件特征码和/或所述第一水印保存在档案管理系统中;对所述采集模块生成的第二扫描件进行安全认证计算得出计算图像的第二文件特征码,和/或,根据图像信息生成所述图像的第二水印; 第二判断模块,用于判断第二文件特征码和/或第二水印与档案管理系统保存的第一文件特征码和/或第一水印是否相同; 第二处理模块,用于如果所述第二判断模块判断出相同后,允许对档案管理系统中的所述图像进行处理。 7.- kinds of image-based security authentication device, wherein, comprising: a collection module, for generating a first image acquisition scan and the second scanning element; a first processing module for generating said collection module a first scanning element for secure authentication of the image is calculated first document signature, and / or, in accordance with the first image information to generate the watermark image, the first file signature and / or the the first watermark is kept in the file management system; second scanning member in said acquisition module generates second calculated authentication security document signature obtained image is calculated, and / or, in accordance with image information to generate the second image watermark; second determining module configured to determine a second signature file is saved and / or the second watermark document and file management system of the first pattern and / or the first watermark are the same; a second processing module for, if the said second determining module determines the same, allowing the image file management system for processing.
8.根据权利要求6所述的基于图像的安全认证装置,其特征在于,所述第一处理模块,具体用于: 对第一扫描件和第二扫描件的所有像素点信息进行MD5加密,并通过摘要算法分别计算出第一扫描件的第一文件特征码和第二扫描件的第二文件特征码; 通过对图像中的相同信息,并通过Linux标准规范LSB算法,分别生成第一扫描件的第一水印和第二扫描件的第二水印。 8. Security Authentication apparatus according to claim 6 according to the image, wherein the first processing module is configured to: scan a first member and a second scan of all pixels MD5 encrypted information element, It is calculated by the algorithm and the digest of the first file signature and the second member of the first scanning member scanning a second document signature; by the same information in the image, and Linux standard specification LSB algorithm, generate a first scan the first member of the second watermark and the watermark of the second scanning member.
9.根据权利要求6所述的基于图像的安全认证装置,其特征在于,所述装置还包括: 设置模块,用于设置用户的安全认证方式,所述安全认证方式包括用户名、密码、指纹和脸部特征扫描中的一种或几种; 第一判断模块,用于根据设置的安全认证方式判断用户是否合法; 所述第二处理模块,还用于在所述第一判断模块判断合法后,允许用户进入档案管理系统。 9. The image-based security authentication device, wherein according to claim 6, said apparatus further comprising: a setting module configured to set a user authentication security, the security authentication method comprises a user name, password, fingerprint and scanning features of one or more faces; a first determining module configured to determine the authentication mode according to the security settings of the user is legitimate; the second processing module is further configured to the first determining module determines legitimate after that allows the user to enter the file management systems.
10.根据权利要求6所述的基于图像的安全认证装置,其特征在于,所述第一处理模块,还用于:将所述第一文件特征码和/或第一水印与所述图像进行绑定,并将所述图像与绑定的第一文件特征码和/或第一水印保存在档案管理系统中; 所述第二判断模块,具体用于:在档案管理系统查询和所述图像对应的第一文件特征码和/或第一水印,将第一文件特征码与第二文件特征码进行比对,和/或第一水印与第二水印进行比对。 10. The image-based security authentication device, wherein according to claim 6, the first processing module is further configured to: the first file signature and / or the first watermark image binding, and the binding of the first image and the signature file and / or the first watermark in the file storage management system; the second determining module is configured to: query and the file management system of image corresponding to the first file signature and / or the first watermark, the first file signature with the signature file to compare a second comparison, and / or the first watermark and a second watermark.
CN 201510516025 2015-08-20 2015-08-20 Image-based safety certification method and device CN105138873A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201510516025 CN105138873A (en) 2015-08-20 2015-08-20 Image-based safety certification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201510516025 CN105138873A (en) 2015-08-20 2015-08-20 Image-based safety certification method and device

Publications (1)

Publication Number Publication Date
CN105138873A true true CN105138873A (en) 2015-12-09

Family

ID=54724218

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201510516025 CN105138873A (en) 2015-08-20 2015-08-20 Image-based safety certification method and device

Country Status (1)

Country Link
CN (1) CN105138873A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000083159A (en) * 1998-04-13 2000-03-21 Internatl Business Mach Corp <Ibm> Method for distributing and authenticating data set by using water-mark and device therefor
JP2002215029A (en) * 2001-01-22 2002-07-31 Seiko Epson Corp Information authentication device and digital camera using the same
CN101059863A (en) * 2006-04-20 2007-10-24 刘瑞祯 Embed and detection method for identifying water mark, its system and uses
CN101079101A (en) * 2007-06-19 2007-11-28 中山大学 Zernike moment based robust hashing image authentification method
CN103238159A (en) * 2010-09-28 2013-08-07 华为技术有限公司 System and method for image authentication
CN104462896A (en) * 2014-11-19 2015-03-25 福建亿榕信息技术有限公司 Reliable video data acquisition and certification method with security certification function

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000083159A (en) * 1998-04-13 2000-03-21 Internatl Business Mach Corp <Ibm> Method for distributing and authenticating data set by using water-mark and device therefor
JP2002215029A (en) * 2001-01-22 2002-07-31 Seiko Epson Corp Information authentication device and digital camera using the same
CN101059863A (en) * 2006-04-20 2007-10-24 刘瑞祯 Embed and detection method for identifying water mark, its system and uses
CN101079101A (en) * 2007-06-19 2007-11-28 中山大学 Zernike moment based robust hashing image authentification method
CN103238159A (en) * 2010-09-28 2013-08-07 华为技术有限公司 System and method for image authentication
CN104462896A (en) * 2014-11-19 2015-03-25 福建亿榕信息技术有限公司 Reliable video data acquisition and certification method with security certification function

Similar Documents

Publication Publication Date Title
Rathgeb et al. A survey on biometric cryptosystems and cancelable biometrics
US6167518A (en) Digital signature providing non-repudiation based on biological indicia
US6856977B1 (en) Method and system for proving ownership of digital data
US20030074567A1 (en) Mehod and system for detecting a secure state of a computer system
Zauner Implementation and benchmarking of perceptual image hash functions
US20040193893A1 (en) Application-specific biometric templates
US20070118758A1 (en) Processing device, helper data generating device, terminal device, authentication device and biometrics authentication system
US20080120707A1 (en) Systems and methods for authenticating a device by a centralized data server
US20080120698A1 (en) Systems and methods for authenticating a device
US20050207614A1 (en) Iris-based biometric identification
US20030012374A1 (en) Electronic signing of documents
Huang et al. Improved DCT-based detection of copy-move forgery in images
US20070245152A1 (en) Biometric authentication system for enhancing network security
US20060056662A1 (en) Method of multiple algorithm processing of biometric data
US6851051B1 (en) System and method for liveness authentication using an augmented challenge/response scheme
US20130007874A1 (en) System and method for authenticating a user
US20020150277A1 (en) Method and system for generating data of an application with a picture
US7117356B2 (en) Systems and methods for secure biometric authentication
Breebaart et al. A Reference Architecture for Biometric Template Protection based on Pseudo Identities.
US7274804B2 (en) Method and apparatus for hashing data
US20080162943A1 (en) Biometric security system and method
US20030070079A1 (en) Method and system for preboot user authentication
US20070162739A1 (en) Biometric identification network security
US20090310779A1 (en) Method for generating cryptographic key from biometric data
US20080141365A1 (en) Document management with verifiable time-of-archive capability

Legal Events

Date Code Title Description
C06 Publication
C10 Entry into substantive examination