CN108712570B - Method for enhancing live performance and reality of intelligent mobile device for detecting hidden image - Google Patents

Method for enhancing live performance and reality of intelligent mobile device for detecting hidden image Download PDF

Info

Publication number
CN108712570B
CN108712570B CN201810468421.5A CN201810468421A CN108712570B CN 108712570 B CN108712570 B CN 108712570B CN 201810468421 A CN201810468421 A CN 201810468421A CN 108712570 B CN108712570 B CN 108712570B
Authority
CN
China
Prior art keywords
image
live
mobile device
hidden
base
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810468421.5A
Other languages
Chinese (zh)
Other versions
CN108712570A (en
Inventor
臧戈平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810468421.5A priority Critical patent/CN108712570B/en
Publication of CN108712570A publication Critical patent/CN108712570A/en
Application granted granted Critical
Publication of CN108712570B publication Critical patent/CN108712570B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Human Computer Interaction (AREA)
  • Marketing (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • User Interface Of Digital Computer (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention provides a method for enhancing the live performance and authenticity of a hidden image detected by an intelligent mobile device, and relates to the technical field of information identification and anti-counterfeiting of intelligent mobile phones or intelligent mobile devices. The method comprises the steps that after a smart phone or smart mobile device decrypts a hidden base image in a frame page corresponding to a live video, a surface image video live and at least one part of the hidden base image decrypted from the frame page corresponding to the live video are synchronously displayed. The invention can synchronously display the live condition of the table diagram and the detected base diagram corresponding to the live condition of the table diagram and form dynamic comparison, thereby greatly increasing the real-time property, the authenticity, the transparency, the certainty and the live condition of detecting or reading the base diagram, greatly reducing the possibility that the presswork containing the hidden image and the reading APP thereof are counterfeited, and better ensuring the functions of scanning the diagram, scanning the code, preventing the false source tracing and preventing the channel conflict by using the intelligent mobile phone or the intelligent mobile device APP.

Description

Method for enhancing live performance and reality of intelligent mobile device for detecting hidden image
Technical Field
The invention relates to the technical field of information identification and anti-counterfeiting of smart phones or smart mobile devices, in particular to a method for enhancing the live performance and authenticity of a hidden image detected by a smart mobile device.
Background
There has been a considerable history of techniques for hiding other images or information in printed sheets. With the development of digitalization of printing, more and more technical methods for hiding images or information are developed and applied, and the technical methods are most widely applied to the anti-counterfeiting field. The most representative high fidelity hidden map technologies include the SI technology of Graphics Security systems, the ICI technology of JURA, and the high fidelity hidden map digital screening technologies of patent application nos. 201610519053.3 and 201610518384.5.
The actual displayed image that the viewer can see is called a table diagram; an image which is hidden under a surface image through a specific technology, cannot be distinguished by naked eyes and can be seen through a corresponding detection means is called a bottom image; the process of hiding the base map under the table map is called hiding map.
The hidden image technology is realized by modulating the structure of the screen, and comprises macroscopic and microscopic features of the screen, in the hidden image technology, the detection of the base image is generally realized by adopting a grating sheet with periodicity, and the detection of the base image can also be realized by using a smart phone or a smart mobile device through an algorithm. The detection of the base map by the smart phone or the smart mobile device is far from enough, the detected base map must have enough credibility to ensure that the user really comes from the real object image (i.e. printed matter) shot by the user, which is the key for the smart phone or the smart mobile device to identify the base map.
In the era of mobile internet, smart phones and smart mobile terminal devices have become important components in daily life of people, and information inquiry, shopping, reading, meal ordering, entertainment and communication … … are increasingly completed by using smart phones. The mobile internet brings great convenience to the life of people, meanwhile, more and more industries are combined with the mobile internet, and all the industries are in butt joint with the flow inlet of the mobile internet.
In the anti-counterfeiting industry, scanning anti-counterfeiting, scanning code tracing and scanning code anti-channel conflict become main effective anti-counterfeiting and anti-channel conflict means. And the mobile internet provides new basic technical conditions for scanning pictures, scanning code, anti-counterfeiting tracing and anti-channel conflict landing. A consumer hands a smart phone, and the scanning image or code is convenient and quick to inquire the authenticity and the traceability information; the manufacturer management personnel and the fake-fighting personnel can also scan the products of the company by holding the smart phone or the smart mobile device to obtain related information, and the products of the company are managed and beaten for preventing channel conflict. Meanwhile, consumption is continuously upgraded along with the improvement of living water quality of people, people pay more and more attention to the quality and added value of products, smart phones or other mobile devices scan pictures, scan codes to inquire authenticity and trace source information conform to the consumption psychology of consumers, and meanwhile, technical means for preventing counterfeit goods and preventing channel conflict are provided for product manufacturers.
The following methods are mainly used for tracing and anti-counterfeiting by scanning pictures and codes and preventing channel conflict at present:
in the first category, code scanning redirection is performed by using an APP, that is, a redirection code (for example, a two-dimensional code) is scanned by using an APP of a smart phone or a smart mobile device, then the redirection code is linked to a new background page, a live code character string (for example, a plain code of a normal object code) is scanned or input on the new page, and then the background page returns information to determine whether a product is true or false or other related information.
And in the second type, after the APP scans the code and redirects to a new background page, the APP is used for scanning a hidden code which is invisible to naked eyes, and then the background page returns information to determine the authenticity of the product or other related information.
In the third category, APP scans a hidden code invisible to the naked eye to log on or direct heavy chain access to a background and then returns relevant information to the user.
And in the fourth category, the APP firstly logs in a background, then the APP is used for shooting a picture of a hidden image or a hidden code which is invisible to naked eyes, the static picture is transmitted to the background, and the background returns the readable information of the hidden image or the hidden code through simple comparison, algorithm comparison or image analysis processing, or further gives a conclusion so as to achieve the purpose of checking the authenticity.
The methods for identifying plain codes, hidden codes or hidden pictures of the smart phones or smart mobile devices in the above types have limitations.
In the first technology, because the technology for generating the code has universality, the redirection link code is easily replaced by a fake code, the redirection link code is linked to a fake background when the code is possibly scanned, and a fake website can reply a fake message no matter what the live code input or scanned later is, so that the user is misled. Therefore, graph hiding or code hiding techniques are becoming increasingly important.
In the second kind of technique, scan the APP of hiding the code, when scanning various so-called hidden codes of hiding, the process of not real-time show discernment, or its scanning result does not possess direct legibility in the vision, similar black box operation, only the information that the background returns is as the suggestion for the user, this kind of APP is imitated by fake APP very easily, fake APP can utilize the invisibility of recognition result, no matter any scanning result or never will the scanning result, directly reply a fake backstage or the preset false information in the fake APP.
In a third category of technologies, such covert codes may also be replaced by fixed false redirection links preset inside the fake APP, thereby losing anti-counterfeiting efficacy.
In the fourth kind of technology, hide APP that picture or code technology corresponds, its identification process is at first to take a picture, then pass this static picture back backstage, compare with the networking backstage, but this kind of identification mode is also imitated APP and is imitated through means such as the impersonation backstage replacement of static image, the inside preset image overlap of impersonation APP, the inside preset image of impersonation APP replaces by this kind of APP that imitates easily. The reason for this is that: the basis of this kind of reading is a fixed picture still picture, and a counterfeiter can easily superimpose and replace a preset fake base picture with the same fixed picture on a fixed picture still picture.
In summary, it is far from sufficient that the base map of the hidden image is detected by the smart phone or the smart mobile device, and the detected base map must have enough confidence to let the user to be sure that the content of the base map detected and displayed on the smart phone or the smart mobile device is actually from the physical image (i.e. printed matter) photographed by the user, which is the key for the smart phone or the smart mobile device to recognize the base map. The authenticity of the APP reading is utilized by the attached base image or hidden code in the printed matter, and the key points of the authenticity are real-time property, authenticity, transparency, determinacy, live feeling and expressiveness of the APP reading process, and the authenticity can be verified by other auxiliary physical detection means (such as periodic grating film inspection).
Disclosure of Invention
The invention aims to solve the technical problem of providing a method for enhancing the live performance and authenticity of the hidden image detected by the intelligent mobile equipment, which is used for carrying out real-time rapid analysis and reading on a live video shot by a camera through an internal algorithm of the intelligent mobile phone or the intelligent mobile equipment APP, synchronously displaying the live performance of a table diagram and a detected base diagram corresponding to the live performance of the table diagram, and forming dynamic comparison on the live performance and the detected base diagram, thereby greatly increasing the real-time performance, authenticity, transparency, certainty and live feeling of detecting or reading the base diagram, greatly reducing the possibility of counterfeiting the intelligent mobile phone or the intelligent mobile equipment APP, and better ensuring the functions of scanning the diagram, scanning the code, anti-counterfeiting and tracing to the source and preventing channel conflict by using the intelligent mobile phone or the intelligent mobile equipment APP.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows:
a method for enhancing the liveness and authenticity of a smart mobile device detecting a hidden image, the method comprising: after the smart phone or smart mobile device decrypts the hidden base image in the frame page corresponding to the live video, the table image video live and at least a portion of the hidden base image decrypted from the frame page corresponding to the live video are synchronously displayed.
Further, the decrypted base image is continuous, stepwise continuous, discrete, or discontinuous.
Further, the synchronization is displayed as: part or all of the live view video and the detected base image are alternately displayed in the same area or position on the display.
Further, the alternate display method includes, but is not limited to, switching, overlapping, fading, changing the blend ratio of the top and bottom images, or other video transition methods.
Further, another case of the synchronous display is that: the live video of the table view and the detected base image are simultaneously displayed at different locations of the display, the different locations including different windows.
Further, each of the synchronized displays is synchronized with the table image live video at the time of the base image update and is synchronized or unsynchronized with the table image video at the time of the base image pullback.
Further, when the decrypted base image is not continuous, the display time of the frame page of the base image is prolonged, including but not limited to, when the next frame decrypts the base image.
Further, the base image displayed over an extended period of time is a repetition of the original base image, or a base image decrypted with different parameters from the table image corresponding to the base image, or an animation of the base image decrypted with a series of parameters.
Further, the synchronized display, the sheet of chart video frames and the decrypted base image are displayed with an error in time of less than 1 second or less than 0.5 second or less than 0.2 second, the error including the display of the base image later than the chart live video.
Further, the displayed decrypted base map image includes a plurality of layers of base maps, at least one of the plurality of base maps being synchronized with the live video of the table map.
Further, the base map hidden under the table map is realized by a hidden map method based on dot modulation, including but not limited to modulation of a conventional periodic dot screen.
Further, the smart phone or smart mobile device is a hardware-software system including a photographing part, a display part, and a module having an image processing function.
Further, the smart phone or smart mobile device includes, but is not limited to, a smart phone, a tablet computer, a notebook computer, a portable electronic terminal, a wearable device, a dedicated mobile terminal device.
Further, the type of operating system used by the smartphone or smart mobile device includes, but is not limited to, android, apple i0S, and other customized smart mobile device operating systems.
Adopt the produced beneficial effect of above-mentioned technical scheme to lie in: the method for enhancing the live performance and authenticity of the detection hidden image of the intelligent mobile equipment provided by the invention carries out real-time rapid analysis and reading on the live video shot by the camera of the intelligent mobile phone or the intelligent mobile equipment APP through the internal algorithm of the intelligent mobile phone or the intelligent mobile equipment APP, synchronously displays the live performance of the table diagram and the detected base diagram corresponding to the live performance of the table diagram, and forms dynamic comparison on the live performance, the authenticity, the transparency, the certainty and the live performance of the detection or reading base diagram, greatly reduces the possibility that the intelligent mobile phone or the intelligent mobile equipment APP is counterfeited, and better ensures the functions of scanning the diagram by using the intelligent mobile phone or the intelligent mobile equipment APP, scanning the code anti-counterfeiting tracing and preventing the channel conflict.
Drawings
Fig. 1 is a flowchart of a method for decrypting a hidden image in a printed matter based on digital video image analysis according to embodiment 1 of the present invention;
fig. 2 is a flowchart of a method for decrypting a hidden image in a printed matter based on digital video image analysis, which is provided with a function of caching a base map, according to embodiment 1 of the present invention;
fig. 3 is a flowchart of a method for decrypting a hidden image in a printed matter based on digital video image analysis, which is provided with a cache table map function according to embodiment 1 of the present invention;
fig. 4 is a schematic diagram of a synchronous display method for image switching or insertion according to embodiment 2 of the present invention; wherein, (a) is continuous video live, (b) is discontinuous base map decipher, (c) is first kind of synchronous switching output, (d) is second kind of synchronous switching output;
fig. 5 is a schematic diagram of a synchronous display method for image switching or insertion according to embodiment 3 of the present invention; wherein, (a) is continuous video live, (b) is discontinuous base map decipher, (c) is stable output base map display;
fig. 6 is a flowchart of a method for displaying a detected hidden image in an animation manner according to embodiment 4 of the present invention.
Detailed Description
The following detailed description of embodiments of the present invention is provided in connection with the accompanying drawings and examples. The following examples are intended to illustrate the invention but are not intended to limit the scope of the invention.
When the APP of smart mobile phone or intelligent mobile device is in the various hidden base maps of discernment printed matter, because APP identification method's restriction or recognition algorithm's defect, real APP is replaced by fake APP easily, and the user can't distinguish the true and false of APP, also can't distinguish the true and false of base map to can't distinguish the true and false of former printed matter, can't realize effectively sweeping the picture, sweep the function that the anti-fake source tracing of sign indicating number, prevent the channel conflict.
The core of the invention is to analyze and read the live video of the table picture with the base picture, which is shot by a camera of the intelligent mobile phone or the intelligent mobile device APP, in real time and quickly through an internal algorithm of the intelligent mobile phone or the intelligent mobile device APP, synchronously display the live picture of the table picture and the detected base picture corresponding to the live picture of the table picture, and form dynamic comparison of the live picture and the detected base picture, thereby greatly increasing the real-time property, authenticity, transparency, certainty and live sense of detecting or reading the base picture, greatly reducing the possibility of counterfeiting the APP, and better ensuring the functions of scanning the picture, scanning the code anti-counterfeiting and tracing and preventing channel conflict by using the intelligent mobile phone or the intelligent mobile device APP.
The technical difficulties to be solved by the invention are as follows: the frame rate of the base map decrypted by the smart phone or the smart mobile device may be lower than the number of visually almost continuous video frames of the table map shot by the camera of the smart phone or the smart mobile device in real time, and it is difficult to form a one-to-one correspondence on the number of frames. The technical difficulties to be solved by the invention are two: and the frame rate of decrypting the hidden image by the smart phone or the smart mobile device is increased as much as possible.
The basic hardware requirements for decrypting the base map with the smart mobile device in the present invention include, but are not limited to:
equipment requirements: a camera (camera), a display screen, and an image processor (cpu, gpu, spu signal processor), etc.;
the device type: various mobile devices such as mobile phones, tablet computers, wearable devices, special mobile terminals and the like;
operating the system: android, ios (apple), etc., may also be specially developed and customized systems.
Example 1
Through the embodiment, the general process and difficulty of detecting the hidden image by the smart phone or the smart mobile device can be known. The video is formed by connecting the discrete images with higher acquisition frequency in series, so that the visual continuous effect is achieved by using the persistence of vision, and each discrete image is called a frame. Typically, the analytic interpretation of the hidden image is performed independently on a per-frame basis.
The detection and decryption of the base image has specific requirements on the image quality of the original image taken or intercepted. According to the specific mode of hiding the figure, the requirements are slightly different, but the requirements for focusing and magnifying power of the shooting system are higher.
Due to the high anti-counterfeiting and anti-copying functions, the technology for hiding the image by modulating the dot structure (such as SI technology of Graphics Security System company, ICI technology of Jura company and high-fidelity hidden image digital screening technology with patent application numbers of 201610519053.3 and 201610518384.5) has a good development prospect. High quality prints require the use of high line count (e.g., 1751pi) screens, where the hidden image must also be constructed with dots of similar high frequency (spatial frequency). In order to detect the base image, the captured or scanned image must have a sufficiently high resolution to be able to resolve subtle changes in dot structure. Taking 1751pi as an example, it is necessary to distinguish between inked (dot) and non-inked (background) regions, and therefore, the image requires a substantial resolution of at least about 2 × 175 to 350 dpi. For higher anti-counterfeiting efficacy, when the image is hidden, a higher frequency screen or a finer structure is often used, so that the requirement on the resolution of the image is higher, and the requirement on the actual resolution of 1000dpi or even higher is not rare.
The technology for realizing the hidden image through the modulation of the dot structure is not limited to the printed image, and the application of the technology can also be realized through grains on the surface of an object. For example, the dark and light lines similar to the screen lines or other reflective lines are formed on the surface of the object or the surface of the substrate by methods of molding, carving and the like, and the image can also be hidden. In the detection, the map may be decrypted by an optical device such as a grating or an image processing method under a specific light condition (for example, side light). The present invention is equally effective in detecting and decrypting such hidden images.
The substantial resolution of an image refers to the actual resolution of the image and not just the pixels dpi of the image. In general, the substantial resolution of an image is lower than the pixel resolution of the image, sometimes much lower, such as poor image focus, and for example, the camera employs interpolation to give a pseudo-high dpi value, etc.
In order to achieve higher spatial resolution, cameras on existing smart phones or smart mobile devices can generally achieve close-range (less than 20cm) shooting, and sometimes even shoot at the shortest distance (minimum object distance) allowed by the cameras, so that the maximum magnification is obtained, and meanwhile, accurate focusing is guaranteed. From the technical point of view, the close-distance precise focusing is a great challenge for the camera, and in addition, the hand shake of the user in the shooting process makes it very challenging to obtain a frame of high-resolution image suitable for analyzing, detecting and decrypting the base image.
In this embodiment, taking a smart phone as an example, a method for detecting a hidden base image in a frame page corresponding to a live video in the smart phone is a method for analyzing and decrypting a hidden image in a printed matter based on a digital video image, as shown in fig. 1, and the specific method is as follows.
The first step is as follows: precision focus analysis: and shooting a table chart to be identified by using a camera of the smart phone or the smart mobile equipment, and carrying out focusing analysis on a certain frame of image shot by the camera of the smart phone or the smart mobile equipment. There are many conventional methods for the focused analysis of digital images, including but not limited to contrast analysis, sharpness analysis, and the like. If the focusing is good enough and meets the requirement of accurate focusing, the next step is carried out; and if the requirement of accurate focusing is not met, returning to select the next frame and continuing the focusing analysis process.
The method of obtaining high resolution high magnification images from a page of video frames is very advantageous for detecting decrypted hidden images. Because of the difficulty of camera focusing at close range, the chance is somewhat evanescent. Video images provide a large number of opportunities, and focus analysis of video frame page images gives a means to catch the opportunities.
The second step is that: and (3) analyzing geometrical characteristics: and measuring and calibrating the geometric characteristics of the frame digital image, particularly the dimension and the direction of the image.
The digital image is based on pixels, and its geometrical features are described by rectangular coordinates in pixels. Such as the center position, the orientation of the lines and the spacing of the dots from the dots, etc. Where the scale (measure of distance) is in pixels, the absolute scale has a certain randomness, and there must be an amount that relates the pixels to the actual spatial scale, e.g. the dpi number of the image, i.e. the number of pixels per inch.
A digital image of a printed matter of a hidden image can be detected and analyzed only by meeting a certain condition, particularly the condition of resolution ratio, and the hidden image is extracted. The conditions are related to the way and parameters of the hidden graph. For example, a hidden image based on a dot structure modulation method, a digital image of an object carrier (printed matter) must have sufficient resolution to clearly distinguish the dot structure change, and an inked area and a background blank area of a dot must be clearly distinguished. That is, at least one pixel is needed between two dots to display the blank area, i.e., the dot pitch is at least larger than two pixels. As mentioned above, if the image does not reach enough resolution (magnification and definition, basic requirement: dpi > 2 × screen lpi) through the dimension and direction detection, the image of the frame can not be used, and the next frame is selected and the first step process is continued.
And when the digital image of the hidden base map is subjected to geometric characteristic analysis, particularly, dimension and direction detection, and meets the resolution requirement required by hidden map detection and analysis, the next hidden map detection and analysis can be carried out.
The third step: and (5) detecting and analyzing the hidden picture. The detection analysis of the hidden map comprises obtaining the hidden map mode and the parameters related to the hidden map mode. For detection and analysis of digital images, it is necessary to obtain geometric parameters in units of pixels and with reference to a coordinate system in which the pixels are located.
Some or all of the ways and parameters of the hidden drawings can sometimes be known in advance, such as the parameters of the hidden-drawing printed product during design production (these parameters for the hidden-drawing printed product design are sometimes still valid for its digital image); or can be obtained by algorithmic conversion (e.g., a digital image obtained by a scanner has a good geometric relationship with the original image, including a direction that is horizontal and vertical and has few large deflections; and is also very accurate in scale, such as 600 dpi). Therefore, when the hidden image pattern and the relevant parameters are known in advance, the hidden image detection analysis of the scanned image can obtain the parameters in units of pixels and with reference to the pixel coordinate system by simple conversion, and then the image is directly processed in a manner corresponding to the hidden image pattern to detect the hidden underlying image.
However, for smartphones or smart mobile devices, the geometric relationship between the entity image and its digital image becomes very uncertain. For example, the orientation of the camera and the orientation of the paper it is taking may be greatly angularly offset; as another example, the change in the distance of the camera from the page of the print can greatly change the dimensions of the digital image (e.g., dpi). In this case, only part of the information (e.g. the tibetan method) may be pre-acquired, while at least part of the geometrical parameters need to be obtained by analytical measurements of the digital image.
As mentioned above, the hidden image detection analysis of the digital image only needs to be based on the geometric parameters (relative measurement parameters or geometric parameters of the pixel space) of the pixels and the coordinate system thereof, and does not necessarily need to be based on the actual dimensions (e.g. centimeters, inches, etc.) and the absolute parameters of the solid image. Taking the scanner as an example, the method of converting the absolute geometric parameters of the solid image into the geometric parameters of the pixel space by means of the dpi of the scanner (equal to the dpi of the digital image) is shown.
In the case of the hidden image detection and analysis of a digital image having an uncertain geometric relationship with a solid image, a direct method is to establish the geometric relationship between the digital image and the solid image by using a method such as a positioning mark or a positioning point (a reference point for helping to establish a point-to-point relative position and a special icon for easy recognition and resolution).
Another approach to obtaining the hidden map method and geometric parameters based on image processing analysis is more efficient, particularly for techniques that hide the map by modulating the dot structure, such as the high fidelity hidden map digital screening techniques of patent applications nos. 201610519053.3 and 201610518384.5. Through analyzing the structural characteristics of the dots, including but not limited to analyzing the dot spacing, period, frequency, trend, shape, size and other characteristics, the related geometric parameters of the dot structure such as scale, direction, position and the like are obtained, even the mode of obtaining the hidden image directly.
The existing hidden image technologies are various, most of them are based on digital screening, for example, the high fidelity hidden image digital screening technologies with patent application numbers of 201610519053.3 and 201610518384.5, and there are methods of screen angle modulation, dot frequency modulation, dot shape modulation, dot phase modulation, bidirectional dot (dot) phase modulation, dynamic moire, etc., and the basic principle of these methods is: starting from an initial reference dot screen system structure, according to the requirements of the hidden picture, the system structure of the reference dot screen is modulated according to the graph of the hidden picture, and the modulation method comprises the steps of but not limited to the size, the shape, the black and white, the position, the phase, the density, the frequency, the angle and the like of dots. For the method for realizing the hidden image by the texture on the surface of the object, the modulation method also comprises the depth of the texture or the strength of the light reflecting performance.
For the hidden graph technology based on the digital hanging net, a positioning mark is not required to be arranged generally. In this case, the magnification (linear scale) can be estimated by an algorithm, for example, by the pitch or the period (frequency) of the dots, and the direction of the image can be estimated by the direction of the dots. An efficient method is to perform calculations in frequency space, such as a two-dimensional fourier transform. The frequency (lpi) and direction of the mesh point can be accurately calculated by using the position corresponding to the peak value in the frequency space.
The acquisition of the hidden graph mode and the hidden graph parameters can combine the information known in advance and the result of actual measurement calculation so as to optimize the accuracy of the required parameters to the maximum extent and reduce the time and resources required by calculation and analysis. For example, if the approximate direction of the dots used in the occlusion map is known in advance, the parameter search range can be greatly reduced when the digital image parameters are calculated and analyzed.
Fourthly, decrypting and obtaining a base map: and (4) detecting one or multiple base maps by algorithm calculation according to the information obtained in the third step and the original map method and a method corresponding to the original map method.
According to the original modulation mode of the hidden image, the corresponding decryption modes of the bottom image are different, and the basic principle is to compare the modulated dot screen with the initial reference dot screen structure so as to decrypt the hidden bottom image information. Optical inspection is based on the structure of the original reference dot screen or some characteristic thereof, creating an optical mask or micro-mirror array (e.g. a grating) as the inspection film, and then covering the inspection film on the table image like a mask, and through the inspection film, the hidden image or information can be decrypted.
The algorithm for decrypting the digital image of the hidden base map may include simulating a physical decryption device or means with a digital algorithm. For example: a method for hiding picture by modulating phase of periodic lattice point, the detection to its solid printed matter can be detected in the corresponding direction by the grating plate of the corresponding frequency; because of the parameters provided in the third step, the corresponding frequency and direction parameters in pixel space are provided, and the base map can be calculated and detected by a digital algorithm similar to a grating. For example, the hidden image method is modulated at 1751pi, the image obtained by the camera is 1000dpi, and the corresponding halftone frequency is 175 lines/1000 pixels, that is, 1000/175 is 5.714 pixels/line (period), and the base image can be decrypted by using a set of digital parallel line masks having the period in the specified direction.
The flexibility of digital algorithms, including but not limited to simulating physical decryption devices or apparatus with digital algorithms, to decrypt digital images of underlying images may provide tremendous room and opportunity for improvement. One obvious advantage is the detection and analysis of the digital image with multiple underlying graphs hidden by multiple methods or different parameters, and the digital detection and analysis algorithm can be used for multiple purposes by one graph without replacing a detection instrument and simultaneously decrypt the multiple underlying graphs by different methods or parameters.
It is not easy to obtain a good frame of image with motion detection devices that can detect the base image. Therefore, once a good image frame is found, it should be saved. Two storage, including caching, methods are illustrated below that are effective for video, especially live video.
In the first storage and caching method, after the base map is decrypted, the base map is stored in a cache, as shown in fig. 2. Its advantages are quick calling, and small size (less memory capacity) than original image.
In the second buffering method, the original selected frame image is stored in a buffer, as shown in fig. 3. When called, the base map is obtained by recalculation. The advantage is that the original image of the original selected frame can be stored without loss, further optimized when being called again, and multiple base images can be detected without storing multiple images.
So far, the present embodiment may obtain one or more hidden base maps obtained by detection and analysis. However, it is far from sufficient to decrypt the base map by using the smart phone or the smart mobile device, and the decrypted base map must have enough confidence to ensure that the content of the base map detected and displayed on the smart phone or the smart mobile device is actually from the physical map (i.e. the printed matter) photographed by the smart phone or the smart mobile device. This is the key to identifying the base map by the smartphone or smart mobile device.
When the base map can be decrypted continuously, the base map video and the table map video which are displayed synchronously can form real-time comparison, and the reality is enhanced. However, in many cases, these hidden base maps are likely to be discontinuous and non-linear. And the video live of the chart shot by the camera of the smart phone or the smart mobile device in real time is continuous and linear. The table image video and the detected hidden image cannot form one-to-one correspondence on the frame number, so that one-to-one comparison according to the corresponding frame cannot be formed.
In order to keep the live sensation and the reality of the live situation, and to make the decrypted base map form a dynamic comparison with the table map shot when the base map is decrypted, the base map is merged into the table map or a detector can really feel that the base map is really originated from the detection process in the table map instead of a fixed image preset in an algorithm, and the combination and synchronous display of the base map and the table map are very important. Two different modes of visualization are shown below by example 2 and example 3, respectively. In actual operation, the two modes are not exclusive and can be used respectively, simultaneously or mutually compatible and combined.
Example 2
In this embodiment, the method for enhancing the live performance and reality of the smart mobile device detecting the hidden image is a synchronous display method of image switching or insertion, as shown in fig. 4, a first row in the figure displays a series of list frames of a continuous list video; the second line shows the corresponding decrypted hidden base map, for example, the base map is obtained only at frame numbers 3, 6, 7, 11; the third row shows an image display mode, namely, the original table image frame is switched by the decrypted base image on the original table image frame of which the base image is decrypted.
The fourth row in fig. 4 shows a method for enhancing the effect of persistence of vision of the base map, i.e., the display time of the base map is prolonged, for example, by 1 second, so that when a user observes a real-time video captured in real time by a camera of a smart phone or a smart mobile device, the effect of persistence of vision of a real-time video selection table map frame is retained, and then the base map decrypted in 1 second is synchronously switched and displayed, thereby forming comparison.
The core of this method is that at the time of base map cut-in, the base map and the corresponding table map video are synchronized or nearly synchronized. The decryption of the base map has a certain delay due to the large calculation amount of the algorithm, but as long as the delay is not large (for example, less than 1 second), the subjective feeling of the visual synchronous switching is not influenced.
The base map obtained by digital image processing generally contains many features of the table map, not the original base map completely independent of the table map. It is the comparison, especially the synchronous dynamic comparison, between the table image features left by these hidden images and the table image video, which makes it very difficult to replace counterfeit with the preset fixed image.
In this embodiment, only simple switching is adopted, and in specific implementation, other transition switching modes may also be adopted, for example, switching, overlapping, fading in and out, change of fusion ratio, or other video transition methods.
This embodiment can be broadly understood as that in a specific display space region, the video images are synchronously switched or transited in one direction along with time, that is, the table image video and the base image are almost synchronous within a certain time range of the base image cut-in. When the base map is cut, it is not synchronized. Therefore, unidirectional synchronous handover is the core of this method.
Example 3
The embodiment provides another method for enhancing the live performance and the reality of the detection of the hidden image by the intelligent mobile device, namely a mode for synchronously displaying the base image and the table image videos. As in embodiment 2, live video of the table map taken by the smartphone or smartphone camera in real time is continuous, but the base map decrypted by the algorithm selecting a particular frame of the table map may be intermittent and non-linear. In this embodiment, the displayed space region is divided into several parts, or several windows are directly displayed, and the table diagram live and one or more synchronized decrypted base diagrams are synchronously displayed in a plurality of windows, as shown in fig. 5.
Different from embodiment 2, a certain partial region or a certain sub-window displays a complete table image continuous video shot by a camera of a smart phone or a smart mobile device in real time, and other regions or other sub-windows display one or more base images decrypted from a table image frame respectively corresponding to the partial region or the sub-window. The decrypted base map of each sub-window is displayed continuously until the next decrypted base map, so that the display of the base map of each sub-window is stable, enough display time is provided for a user to read, the updating of the base map is synchronous with the live video of the table map, and the cutting of the base map is asynchronous with the live video. This is another method of synchronously switching the display in one direction.
Embodiments 2 and 3 show the division of the unidirectional synchronization (only synchronization when base map update is switched in) display in time and space respectively, but the two are not in opposition and can be used together or compatible. For example, the live video in embodiment 3 may be replaced by some scheme in embodiment 2. Therefore, any combination of the ways of implementing synchronous display of the hidden and table images in the embodiment 2 and the embodiment 3 is within the coverage of the present invention.
Example 4
The decryption of the base map in the hidden map printed product is completed by combining a decryption method corresponding to the hidden map method with a group of parameters, and the detection effect of the base map can be influenced by the change of the parameters. For example: the most common one is a hidden image method for modulating the phase of periodic dots, and the background image of the printed matter after hidden image by the method can be detected by a grating plate with matched frequency. The angle change of the grating sheet can cause the density and direction change of interference fringes (moire fringes) when the base image is displayed. The movement of the grating plate may cause a phase change, thereby causing a movement effect of interference fringes (moire). Similar effects can be obtained for digital base map images decrypted by the smart phone or smart mobile device APP of the printed matter, as shown in fig. 6, the method is to change the hidden map detection parameters correspondingly. For example, the parameters of the control angle are changed, and for example, the parameters of the control frequency are changed to generate a series of parameters or parameter sets, and then the digital image table of the printed matter is subjected to base image decryption by using each (group of) parameters, so that a series of detected images containing base images are obtained, and the series of images can be displayed in an animation mode, so that the effect of higher expressive power reality is achieved.
The animation display mode can be completed only by one digital image of a table picture, and the effect and the dynamic sense of the detection of the base picture are controlled by a series of parameters on one digital image of the table picture, so that the animation display mode is not limited to the digital image obtained by video, and can be widely applied to the digital image obtained by any mode, including but not limited to scanning, photographing, screen capturing, frame taking and the like, and even including the design draft of the digital image.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit of the corresponding technical solutions and scope of the present invention as defined in the appended claims.

Claims (10)

1. A method for enhancing the live performance and the authenticity of a hidden image detected by an intelligent mobile device is characterized in that: the method comprises the following steps: the method comprises the steps that real-time rapid analysis and reading are carried out on live videos shot by a camera of a smart phone or smart mobile device through an internal algorithm of the smart phone or smart mobile device APP, after the smart phone or smart mobile device decrypts bottom map images hidden in a frame page corresponding to the live videos, live surface map videos and at least one part of hidden bottom map images decrypted from the frame page corresponding to the live videos are synchronously displayed, and dynamic comparison is formed between the surface map videos and the bottom map images;
the base graph hidden under the table graph is realized by a hidden graph method based on dot modulation, wherein the dot modulation comprises but is not limited to modulation of a conventional periodic dot screen;
the decrypted base image is continuous, stepwise continuous, discrete, or discontinuous;
the synchronized display is: part or all of the live video of the table image and the detected bottom image are alternately displayed on the same area or position of the display; alternatively, the synchronization display is: the live video of the table view and the detected base image are simultaneously displayed at different locations of the display, the different locations including different windows.
2. The method for enhancing the live and reality of a smart mobile device detecting hidden images according to claim 1, wherein: the alternate display method includes, but is not limited to, switching, overlaying, fading, changing the blend ratio of the top and bottom images, or other video transition methods.
3. The method for enhancing the live and reality of a smart mobile device detecting hidden images according to claim 1, wherein: the synchronous display is synchronous with the table image live video when the base image is updated, and is synchronous or asynchronous with the table image video when the base image is replaced.
4. The method for enhancing the live and reality of a smart mobile device detecting hidden images according to claim 1, wherein: when the decrypted base image is not continuous, the display time of the frame page of the base image is prolonged, including but not limited to the time when the next frame decrypts the base image.
5. The method for enhancing the live and reality of the smart mobile device detecting the hidden image according to claim 4, wherein: the base image displayed over an extended period of time is a repeat of the original base image, a base image decrypted with different parameters from the table image corresponding to the base image, or an animation of the base image decrypted with a series of parameters.
6. The method for enhancing the live and reality of the smart mobile device detecting the hidden image according to claim 3, wherein: and synchronously displaying, wherein the error of the time of the table image video frame page and the decrypted base image display is less than 1 second or less than 0.5 second or less than 0.2 second, and the error comprises that the base image display is later than the table image live video.
7. The method for enhancing the live and reality of a smart mobile device detecting hidden images according to claim 1, wherein: the displayed decrypted base map image includes a plurality of layers of base maps, at least one of the plurality of base maps being synchronized with live video of the table map.
8. The method for enhancing the live and reality of a smart mobile device detecting hidden images according to claim 1, wherein: the smart phone or smart mobile device is a hardware-software system that includes a camera component, a display component, and a module with an image processing function.
9. The method for enhancing the live and reality of a smart mobile device detecting hidden images according to claim 8, wherein: the smart mobile device includes but is not limited to a smart phone, a tablet computer, a notebook computer, and a wearable device.
10. The method for enhancing the live and reality of a smart mobile device detecting hidden images according to claim 8, wherein: the type of operating system used by the smartphone or smart mobile device includes, but is not limited to, android, apple iOS, and other customized smart mobile device operating systems.
CN201810468421.5A 2018-05-16 2018-05-16 Method for enhancing live performance and reality of intelligent mobile device for detecting hidden image Active CN108712570B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810468421.5A CN108712570B (en) 2018-05-16 2018-05-16 Method for enhancing live performance and reality of intelligent mobile device for detecting hidden image

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810468421.5A CN108712570B (en) 2018-05-16 2018-05-16 Method for enhancing live performance and reality of intelligent mobile device for detecting hidden image

Publications (2)

Publication Number Publication Date
CN108712570A CN108712570A (en) 2018-10-26
CN108712570B true CN108712570B (en) 2020-09-22

Family

ID=63869077

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810468421.5A Active CN108712570B (en) 2018-05-16 2018-05-16 Method for enhancing live performance and reality of intelligent mobile device for detecting hidden image

Country Status (1)

Country Link
CN (1) CN108712570B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108647659A (en) * 2018-05-16 2018-10-12 臧戈平 A method of hidden image in decryption printed matter is analyzed based on digital video image

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017146297A1 (en) * 2016-02-22 2017-08-31 신현해 Security system and method for preventing illegal leakage of hidden camera image and coping with crime in real-time
CN105550891B (en) * 2016-03-01 2019-07-09 源品汇信息科技(北京)股份有限公司 A kind of method and system that product false proof is traced to the source
CN107888925B (en) * 2017-11-03 2019-08-16 清华大学深圳研究生院 A kind of embedding grammar and detection method of digital video hiding information

Also Published As

Publication number Publication date
CN108712570A (en) 2018-10-26

Similar Documents

Publication Publication Date Title
Piva An overview on image forensics
JP4374331B2 (en) Image generating apparatus, program, and recording medium
US8891815B2 (en) Invisible information embedding apparatus, invisible information detecting apparatus, invisible information embedding method, invisible information detecting method, and storage medium
CN115997207B (en) Detecting a sub-image region of interest in an image using a pilot signal
US9177199B2 (en) Semantic magazine pages
KR101574302B1 (en) Method of image inserted data and apparatus performing the same
US9626934B2 (en) Display format using display device for machine-readable dot patterns
EP3525469A1 (en) Time slice image provision server, method and user terminal
JP2006338251A (en) Color image superposition barcode, and method and device for generating color image superposition barcode
CN108712570B (en) Method for enhancing live performance and reality of intelligent mobile device for detecting hidden image
CN108647659A (en) A method of hidden image in decryption printed matter is analyzed based on digital video image
CN112188031A (en) Image processing method and device, computer equipment and storage medium
JP6352875B2 (en) Marker generation method, marker decoding method, marker decoding device, and marker reading device
CN108694717A (en) The method of the authenticity and expressive force of the hidden image decrypted in enhancing digital picture
CN113177517A (en) Method for unlocking anti-counterfeiting hidden image in printed matter based on intelligent mobile equipment
JP6979694B2 (en) Authentication system, authentication method and authentication program that authenticates hidden images or hidden information
KR20230140457A (en) Resolution measurement method, resolution measurement system, and program
JP2017072958A (en) Image processing device, method and program for decoding information multiplexed on image
JP4355305B2 (en) Image processing apparatus, computer program, and recording medium
CN114564705B (en) Traceable anti-shooting method and device and storage medium
JP5561649B2 (en) Machine readable dot pattern
KR102532965B1 (en) Method of inserting halftone dot in the image and system performing the same
JP6166767B2 (en) Machine readable dot pattern
US20070297684A1 (en) Data Conversion Apparatus, Data Conversion Method, and Data Conversion System
Rudaz et al. Protecting identity documents by microstructure color differences

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant