KR101752659B1 - Image key certification method and system - Google Patents
Image key certification method and system Download PDFInfo
- Publication number
- KR101752659B1 KR101752659B1 KR1020160019453A KR20160019453A KR101752659B1 KR 101752659 B1 KR101752659 B1 KR 101752659B1 KR 1020160019453 A KR1020160019453 A KR 1020160019453A KR 20160019453 A KR20160019453 A KR 20160019453A KR 101752659 B1 KR101752659 B1 KR 101752659B1
- Authority
- KR
- South Korea
- Prior art keywords
- key
- image
- unit
- images
- key image
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G06F17/30244—
-
- G06F17/30247—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Abstract
A video key authentication method and system are disclosed. The video key authentication system according to an embodiment of the present invention includes a video input unit for receiving or selecting an original video to be used as a video key for user authentication; A key image generation unit generating a plurality of key images from the original image according to a selected key image generation algorithm; A key image providing unit transmitting a first key image, which is one of the plurality of key images, to a user terminal; A data storage unit for storing the original image and a second key image, which is the remaining one of the plurality of key images, in a database; And generating an image key in combination with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm when the first key image is input through the image input unit, And an authentication performing unit for determining whether the user is authenticated according to the comparison result.
Description
The present invention relates to a video key authentication method and system.
With the development of the Internet, the number of networks connected to the Internet has increased rapidly, and the scope and content of information on the Internet has increased widely. Under such an Internet environment, various types of web services (e. G., E-commerce) as well as new types of web services have been developed to be applied to the Internet.
The web service provider system generally uses an ID and a password for identifying and authenticating a certain user for management and security reasons of the user. If you want a stronger authentication, you can use an encrypted public certificate, a security card (a random numbered array card), and a phone certificate. These methods can also help enhance authentication security when used in conjunction with each other.
As a related art, a system and a method for performing authentication only for a user registered in Korean Patent Laid-open No. 10-2015-0081387 are disclosed.
Therefore, the present invention is to provide a video key authentication method and system using one or more key images generated from one original image as a key for user authentication based on an attribute of an image.
The present invention provides an image key authentication method and system that can not restore an original image using only a key image, thereby enhancing authentication security.
Other objects of the present invention will become more apparent through the following preferred embodiments.
According to an aspect of the present invention, there is provided an image processing apparatus comprising: a video input unit receiving or selecting an original image to be used as a video key for user authentication; A key image generation unit generating a plurality of key images from the original image according to a selected key image generation algorithm; A key image providing unit transmitting a first key image, which is one of the plurality of key images, to a user terminal; A data storage unit for storing the original image and a second key image, which is the remaining one of the plurality of key images, in a database; And generating an image key in combination with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm when the first key image is input through the image input unit, And an authentication performing unit for determining whether the user is authenticated according to the comparison result.
The key image generation algorithm and the authentication execution algorithm may be configured to generate and combine key images by one of a pixel maximum value (max) method, a pixel minimum value (min) method, a pixel distribution method, and a histogram method.
Wherein the key image generation unit distributes the pixels of the original image so that each of the pixels of the original image is reflected in only one of the plurality of key images and is not reflected to the rest, And the image key may be generated by adding pixel values to the coordinates.
Wherein the key image generating unit divides the color space element value of each pixel of the original image into the plurality of key images and then outputs a value less than a color space element value of the original image to a portion to which the corresponding color space element value is not allocated And the authentication performing unit may generate the image key by selecting a maximum value among the color space element values for the pixel coordinates corresponding to the plurality of key images.
The key image generation unit may divide the color space element value of each pixel of the original image into the plurality of key images, and then, when the color space element value is not allocated, a value equal to or greater than the color space element value of the original image And the authentication performing unit may generate the video key by selecting a minimum value among the color space element values for the pixel coordinates corresponding to the plurality of key images.
Wherein the key image generating unit extracts the histogram information of the original image and then extracts a predetermined region as a histogram of the first key image and extracts the remaining region as a histogram of the second key image, The original histogram can be completed by combining the histogram of the first key image and the histogram of the second key image.
The key image generating unit may include a histogram extracting unit that extracts color histogram information from the original image through at least one extraction criterion among color space selection, differential quantization, bin selection, weight application, and extraction region selection.
Instead of storing the second key image in the database, the key image providing unit may distribute n (two or more natural number) key images generated by the key image generating unit to n user terminals, If the images are combined, the same image key as the original image can be generated.
And a hint image providing unit for providing a thumbnail corresponding to the original image or the second key image as a hint image for receiving the first key image.
According to another aspect of the present invention, there is provided an image processing method comprising the steps of: (a) receiving or selecting an original image to be used as a video key of a user authentication; (b) generating a plurality of key images from the original image according to a key image generation algorithm selected by the key image generation unit; (c) the key image providing unit transmits the first key image, which is one of the plurality of key images, to the user terminal, and the data storage unit stores the original image and the second key image, which is the remaining one of the plurality of key images, in the database step; (d) receiving the first key image by the image input unit; (e) generating an image key by combining the first key image received in step (d) with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm; (f) determining whether the user is authenticated according to a result of comparing the video key and the original video, and a recording medium on which the program for performing the authentication is recorded.
Wherein in the step (b), the key image generation unit distributes the pixels of the original image in units of pixels so that each of the pixels of the original image is reflected only in one of the plurality of key images and not in the rest, and in the step (e) The image key may be generated by adding pixel values to pixel coordinates corresponding to the plurality of key images.
In the step (b), the key image generator divides the color space element value of each pixel of the original image into the plurality of key images, and then, for a portion to which the color space element value is not allocated, Wherein the authentication execution unit selects a maximum value among color space element values for pixel coordinates corresponding to the plurality of key images in step (e) Can be generated.
In the step (b), the key image generator divides the color space element value of each pixel of the original image into the plurality of key images, and then, for a portion to which the color space element value is not allocated, (E), the authentication performing unit generates the video key by selecting a minimum value among the color space element values for the pixel coordinates corresponding to the plurality of key images I can do it.
In the step (b), the key image generating unit extracts the histogram information of the original image, and then selects and extracts a certain region as a histogram of the first key image, and generates the remaining region as a histogram of the second key image In step (e), the authentication performing unit may combine the histogram of the first key image and the histogram of the second key image to complete the original histogram.
And providing the thumbnail or the second key image corresponding to the original image as a hint image for receiving the first key image before the step (d).
Other aspects, features, and advantages will become apparent from the following drawings, claims, and detailed description of the invention.
According to the present invention, there is an effect that one or more key images generated from one original image are used as a key for user authentication based on an attribute of the image.
In addition, since the original image can not be restored by only the key image, authentication security can be enhanced.
1 is a block diagram of a video key authentication system according to an embodiment of the present invention;
2 is a flowchart of a key image generation method in a video key authentication system according to an embodiment of the present invention,
3 is a flowchart of a method of performing authentication in a video key authentication system according to an embodiment of the present invention,
4A is a diagram illustrating a key image generation algorithm according to the first embodiment,
4B is a diagram showing an authentication performing algorithm according to the first embodiment,
5A is a diagram illustrating a key image generation algorithm according to the second embodiment,
5B is a diagram showing an authentication performing algorithm according to the second embodiment,
6 is a diagram illustrating a key image generation algorithm according to the third embodiment.
While the invention is susceptible to various modifications and alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described in detail. It is to be understood, however, that the invention is not to be limited to the specific embodiments, but includes all modifications, equivalents, and alternatives falling within the spirit and scope of the invention.
It is to be understood that when an element is referred to as being "connected" or "connected" to another element, it may be directly connected or connected to the other element, . On the other hand, when an element is referred to as being "directly connected" or "directly connected" to another element, it should be understood that there are no other elements in between.
The terms first, second, etc. may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. The singular expressions include plural expressions unless the context clearly dictates otherwise. In this specification, the terms "comprises" or "having" and the like refer to the presence of stated features, integers, steps, operations, elements, components, or combinations thereof, But do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, or combinations thereof.
It is to be understood that the components of the embodiments described with reference to the drawings are not limited to the embodiments and may be embodied in other embodiments without departing from the spirit of the invention. It is to be understood that although the description is omitted, multiple embodiments may be implemented again in one integrated embodiment.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Reference will now be made in detail to the preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the like elements throughout. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings. In the following description, well-known functions or constructions are not described in detail since they would obscure the invention in unnecessary detail.
In this specification, an image refers to a still image and may be represented by an image. The image intuitively conveys information and meaning to a person more than texts such as letters, numbers, and symbols. Thus, when a video is used as an authentication key, it may be more useful than a textual password in certain fields.
1 is a block diagram of a video key authentication system according to an embodiment of the present invention.
The video key authentication system according to an embodiment of the present invention uses a key image generated based on an original image for user authentication.
1, the video
The
In this embodiment, the original image is stored in the
Also, in the
At least one of a pixel maximum value (max) method, a pixel minimum value (min) method, a pixel distribution method, and a histogram distribution method may be applied to an algorithm matching set between a key image generation algorithm and an authentication execution algorithm. This will be described later in detail with reference to related drawings.
The key
The key
If the user ID is related to the group user and n (two or more natural number) users need to perform authentication together, the key
The
In addition, the
When a key image for authentication is inputted through the
In addition, the video
The hint image may be a key image stored in the
Alternatively, the hint image may be a thumbnail image of the original image, and may help the user to input the key image for authentication by allowing the user to check what the original image has been pre-registered for image authentication.
It is difficult to restore 100% of the original image used as a video key by thumbnail alone. However, in this case, there is a concern that the thumbnail, which is a hint image, may be reduced due to the camera shots or screen captures in the hint image providing process. In addition to the size reduction of the original image, It is possible to raise the security so that the image characteristic value can be changed in the case of illegal use so that it can not be used for authentication.
In the present embodiment, an original image as a basis for generating a key image is input through the
Hereinafter, a key image generation method and an authentication method performed in the image
FIG. 2 is a flowchart of a key image generation method in an image key authentication system according to an embodiment of the present invention, and FIG. 3 is a flowchart of a method of performing authentication in an image key authentication system according to an embodiment of the present invention.
Referring to FIG. 2, the
The key
The key
If there is only one user to provide the key image, two key images may be generated and one may be stored in the
If the user providing the key image is n (natural number of 2 or more), n key images can be generated. Alternatively, n + 1 key images may be generated and one may be stored in the
In this case, the key
Referring now to Figure 3, a method of performing authentication is illustrated.
The
The
The
Here, the key image (storage key image) stored in the
Alternatively, when n key images are input from n user terminals by authentication for a user group, the n key images input may be scrambled to generate an image key.
The
If the image key and the original image are substantially equal to each other within a specified error range, it is determined that the key image input from the user terminal is true and it is determined that the user authentication is successful (step S70). Further, it is possible to perform subsequent processing (e.g., door opening, login success, successful payment, etc.) in accordance with the authentication success.
However, if the image key is different from the original image, it is determined that the key image input from the user terminal is false and it is determined that the user authentication has failed (step S75). Further, it is possible to perform subsequent processing (for example, non-opening of the door, failure of login, failure of payment, etc.) in response to the authentication failure.
In this embodiment, before receiving the key image in step S50, the hint
The key image generating method and the authentication performing method according to the present invention can be embodied as computer readable codes on a computer readable recording medium. The computer-readable recording medium includes all kinds of recording media storing data that can be decoded by a computer system. For example, it may be a ROM (Read Only Memory), a RAM (Random Access Memory), a magnetic tape, a magnetic disk, a flash memory, an optical data storage device, or the like. In addition, the computer-readable recording medium may be distributed and executed in a computer system connected to a computer network, and may be stored and executed as a code readable in a distributed manner.
Hereinafter, a key image generation algorithm and an authentication performance algorithm will be described with reference to the related drawings.
FIG. 4A is a diagram illustrating a key image generation algorithm according to the first embodiment, and FIG. 4B is a diagram illustrating an authentication performing algorithm according to the first embodiment.
A pixel distribution method is applied to the key image generation algorithm and the authentication performing algorithm according to the first embodiment.
The original image 200 is composed of a plurality of pixels having a two-dimensional array, and a pixel value corresponding to [R, G, B] is assigned to one pixel. Various color spaces such as an RGB color space, a YCbCr color space, and an HSV color space are defined and used. Hereinafter, the RGB color space will be mainly described, but the same contents may be applied to other color spaces. In this case, the pixel value may be a value for a color space element constituting each color space (Y, Cb, Cr for the YCbCr color space, H, S, V for the HSV color space).
In this case, when two
4A, the pixel values of the original image 200 are applied to the first key image 210, the pixel values of the original image 200 are applied to the (1, 2), (2, 1) The pixel value of [0, 0, 0] is applied. The pixel values of the original image 200 are applied to the pixel coordinates of (1,1), (1,3), and (2,2) in the second
The first key image 210 and the second
FIG. 5A is a diagram illustrating a key image generation algorithm according to the second embodiment, and FIG. 5B is a diagram illustrating an authentication performing algorithm according to the second embodiment.
The pixel maximum value (max) method is applied to the key image generation algorithm and the authentication performing algorithm according to the second embodiment.
The original image 300 is composed of a plurality of pixels having a two-dimensional array, and pixel values corresponding to [R, G, B] are assigned to one pixel.
In this case, when two key images 310 and 320 are generated from the original image 300, R, G, and B values included in one pixel are distinguished, and R, G, And the maximum value of the B value is the R, G, and B values of the corresponding pixel of the image key 330.
For example, in (1, 2) pixel coordinates of the original image 300 in FIG. 5A, [R, G, B] = [20,20,20]. In this case, the RGB values of the (1, 2) pixel coordinates of the first key image 310 are [0,10,20] and the RGB values of the (1, 2) pixel coordinates of the second key image 320 are [ 20, 20, 0].
The first key image 310 and the second key image 320 can not restore the original image 300 alone. However, if only the maximum value is taken for each of the R, G, and B values of the pixel coordinates corresponding to the first key image 310 and the second key image 320, (1, 2) of the image key 330, Pixel coordinates have RGB values [20,20,20]. Which is equal to the RGB value of the (1, 2) pixel coordinates of the original image 330.
For this purpose, the R, G and B values of each pixel of the original image 300 are distributed to the two key images 310 and 320 in the key image generation process, The value of R, G, B of the original image 300 may be applied to the maximum value in the image key acquisition process.
Although the present embodiment has been described mainly on the maximum value, it goes without saying that a similar principle can be applied to the pixel minimum value min method. In the case of the pixel minimum value method, after dividing the R, G, and B values of each pixel of the original image into two key images in the key image generation process, A value equal to or greater than the R, G, and B values of the image may be applied so that there is no error when applying the minimum value in the image key acquisition process in the future.
Also, in the present embodiment, the description has been made mainly on the RGB values, but it goes without saying that a similar principle can be applied to the YCbCr value.
FIG. 6 is a diagram illustrating a key image generation algorithm according to the third embodiment.
The histogram method is applied to the key image generation algorithm according to the third embodiment.
In the case of images, color histogram information can be utilized as unique feature values.
The key
First, the histogram extractor divides one image into seven color spaces, and selects a color space to analyze the color histogram among the color spaces.
Basically, the color is determined by the characteristics of the light reflected from the object. Based on the three primary colors designated for the purpose of standardization in the CIE, the color is defined as RGB color space, opponent color color space, YCbCr color space, HSV color space, Various color spaces are defined and used. In the present embodiment, it is assumed that each pixel of the image is placed in the RGB color space for the sake of understanding and explanation of the invention.
Each pixel of the image can be represented by a combination of red (R), green (G), and blue (B), and placed in seven color histogram spaces from three dimensions to one dimension based on the RGB values of each pixel .
If each pixel of the image basically has a YCbCr value, the RGB value may be obtained using the following equation, which is a conversion equation between the YCbCr value and the RGB value, and then placed in the seven color histogram spaces.
[Equation 1]
First, one pixel can be arranged in an RGB (Red, Green, Blue) space, which is a cubic space (three-dimensional space) in which X, Y, and Z axes respectively represent R, G, and B values according to RGB values. Also, a GB (Green, Blue) space corresponding to the YZ flat name in a square space (two-dimensional space) in which two of R, G and B are combined, a BR (Blue, Red) space corresponding to the XZ plane, and an XY plane (Red, Green) space, respectively. In addition, a R (Red) space corresponding to the X axis, a G (Green) space corresponding to the Y axis, and a B (Green) space corresponding to the Z axis are linear spaces (one-dimensional spaces) in which R, G, and B are arranged one- (Blue) space, respectively.
That is, one pixel is arranged in a total of seven color spaces including RGB space as a three-dimensional space, GB space as a two-dimensional space, BR space, RG space, R space as a one-dimensional space, G space, .
If all pixels belonging to the image are arranged in seven color spaces from one dimension to three dimensions based on RGB values, a color histogram for seven color spaces can be obtained.
In this embodiment, the histogram extracting unit selects a color space to be used for key image generation among the color histograms of the seven color spaces. The selection of the color space may be based on user input or according to a predetermined algorithm according to an extraction criterion. In this case, what color space is selected can be used as security logic for authentication.
Next, the histogram extracting unit applies discrimination (irregularly) instead of equalizing the empty region dividing intervals in the process of performing quantization to divide a bin, which is a unit for accumulating frequency counts, into seven color spaces can do. As a method of discriminative quantization, for example, among the seven color spaces, there may be a method in which a color space to be emphasized has a smaller space division interval relatively to the other color space than the other color space.
For example, the B space and the R space are divided into eight empty regions, but the G space may be divided into sixteen empty regions. That is, the G space is finer than the B space or the R space, so that green can be more finely distinguished than blue or red.
In the case of applying the differential quantization, the interval between the bins is made irregular rather than being constant, so that the bin can be used as the security logic itself.
The total number of beans can be reduced compared to delineating beans for every color space, thereby reducing the computation time in the authentication process, thereby enabling quick authentication. Also, at the same time, the accuracy of authentication can be maximized by relatively finely dividing the color space to emphasize accuracy.
In addition, the histogram extracting unit can select a bin to be used for authentication when the image is divided into a plurality of bins through quantization for seven color spaces. All of the bins may be selected, and one or more bins for user authentication may be arbitrarily selected, and the feature vectors may be extracted based on the frequencies belonging to the bins by limiting the selected bins to the selected bins. In this case, which bin is selected can be used as security logic in authentication.
When a plurality of bins are selected, the order of using or storing the selected plurality of bins can be determined based on the user's input or according to a predetermined algorithm. In this case, the selected sequence of beans can also be used as security logic for authentication.
In addition, the histogram extracting unit may select a bin to be emphasized among the bins divided through quantization, and weight the frequency of the bin. Here, the weight reflects the degree of interest of the color gamut.
For example, by applying a predetermined weight only to four bins whose G value is close to 255 out of the 16 bins divided for the G space, a high score is obtained for a case where a green value of 0 to 255 is a large G value .
Or RGB space, by applying a predetermined weight only to bins having a G value close to 255 and an R value and a B value close to 0, the red and blue components are small and the number of pixels having a large green component is large A high score can be given to the image.
Further, the histogram extracting unit selects an area from which to extract a feature vector by the color histogram. A color histogram can be constructed only for a part of the image but not for the whole area, so that the feature vector can be extracted. In this case, which area is selected as the extraction area can be used as security logic in authentication.
The histogram extracting unit can extract the color histogram vector by finding the bin matching each pixel of the image based on the extraction criterion and calculating the matching frequency of each of the bins for all the pixels as the frequency. Then, a feature vector for a spatial average position and a distribution can be generated with respect to pixels belonging to the same bin.
The histogram extracting unit extracts the feature vector from the extracted feature vector based on extraction criteria such as color space selection, differential quantization, bin selection, weight application, and extraction region selection, And the like may be performed.
6, when the
The HSV color space, the HSL (lightness) color space, the HSI (intensity) color space, and the YCbCr color space are used in the key image generation process in the image key authentication system according to the present embodiment. It is possible to apply the pixel maximum value method, the pixel minimum value method, the pixel distribution method, and the histogram method in the same manner.
The video key authentication system and method according to the present embodiment can be applied to the following use examples.
According to the first use example, it can be used for authentication at the time of login of a web site using a photograph.
Generally, websites use user IDs and passwords to authenticate users. If you want a stronger authentication, you can use an encrypted certificate and a security card (a random numbered array card). In addition, by using the image key authentication method according to the present embodiment, the key image extracted from the photograph can be used as the authentication key, so that the authentication can be made easier and more interesting.
According to the second usage example, the user authentication system using a photograph can be utilized as a locker in a hotel room.
The hotel room is equipped with lockers for valuables of travelers. Currently, lockers are managed by simply using numeric passwords. This is because the length of stay for guests is short. That is, it is inconvenient for users to generate IDs for issuance of authorized certificates, or to provide a security card (a random number array card).
However, there are travelers who feel uneasy about security just by using a password (typically four digits). Therefore, if the password is used together with the key image extracted from one of the photographs that the passengers have in the smartphone, it will be a convenient and interesting authentication method while providing stronger authentication.
According to the third usage example, it can be utilized when sending and receiving a text message (including an interactive text message such as a message of KakaoTalk), or when a photo is authenticated on a bulletin board.
When secretly sending and receiving characters between the same person as a lover, if the key images generated from one original image are distributed to each other, the key images are mutually authenticated so that the authenticators can send and receive characters only. If you want to see a related person by posting a notice on a bulletin board (for example, a group meeting board such as a line band), if one of the generated n key images is sent to a corresponding person, It will be useful for security.
It will be apparent to those skilled in the art that various modifications and variations can be made in the present invention without departing from the spirit or scope of the invention as defined in the appended claims. It will be understood that various modifications and changes may be made.
100: video key authentication system 110: video input unit
120: key image generating unit 130: key image providing unit
140: Data storage unit 150: Authentication performing unit
160: hint image providing unit 190: database
Claims (16)
A key image generation unit generating a plurality of key images from the original image according to a selected key image generation algorithm;
A key image providing unit transmitting a first key image, which is one of the plurality of key images, to a user terminal;
A data storage unit for storing the original image and a second key image, which is the remaining one of the plurality of key images, in a database; And
Generating an image key by combining with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm when the first key image is input through the image input unit, And an authentication performing unit for determining whether the user is authenticated according to the comparison result,
Wherein the key image generating unit distributes the pixels of the original image so that each of the pixels of the original image is reflected in only one of the plurality of key images,
Wherein the authentication performing unit generates the image key by summing pixel values of pixel coordinates corresponding to the plurality of key images.
A key image generation unit generating a plurality of key images from the original image according to a selected key image generation algorithm;
A key image providing unit transmitting a first key image, which is one of the plurality of key images, to a user terminal;
A data storage unit for storing the original image and a second key image, which is the remaining one of the plurality of key images, in a database; And
Generating an image key by combining with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm when the first key image is input through the image input unit, And an authentication performing unit for determining whether the user is authenticated according to the comparison result,
And a hint image providing unit for providing a thumbnail corresponding to the original image or the second key image as a hint image for receiving the first key image.
A key image generation unit generating a plurality of key images from the original image according to a selected key image generation algorithm;
A key image providing unit transmitting a first key image, which is one of the plurality of key images, to a user terminal;
A data storage unit for storing the original image and a second key image, which is the remaining one of the plurality of key images, in a database; And
Generating an image key by combining with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm when the first key image is input through the image input unit, And an authentication performing unit for determining whether the user is authenticated according to the comparison result,
Wherein the key image generating unit divides the color space element value of each pixel of the original image into the plurality of key images and then outputs a value less than a color space element value of the original image to a portion to which the corresponding color space element value is not allocated To be applied,
Wherein the authentication performing unit generates the image key by selecting a maximum value among color space element values for pixel coordinates corresponding to the plurality of key images.
A key image generation unit generating a plurality of key images from the original image according to a selected key image generation algorithm;
A key image providing unit transmitting a first key image, which is one of the plurality of key images, to a user terminal;
A data storage unit for storing the original image and a second key image, which is the remaining one of the plurality of key images, in a database; And
Generating an image key by combining with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm when the first key image is input through the image input unit, And an authentication performing unit for determining whether the user is authenticated according to the comparison result,
The key image generation unit may divide the color space element value of each pixel of the original image into the plurality of key images, and then, when the color space element value is not allocated, a value equal to or greater than the color space element value of the original image And,
Wherein the authentication performing unit generates the image key by selecting a minimum value among color space element values for pixel coordinates corresponding to the plurality of key images.
A key image generation unit generating a plurality of key images from the original image according to a selected key image generation algorithm;
A key image providing unit transmitting a first key image, which is one of the plurality of key images, to a user terminal;
A data storage unit for storing the original image and a second key image, which is the remaining one of the plurality of key images, in a database; And
Generating an image key by combining with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm when the first key image is input through the image input unit, And an authentication performing unit for determining whether the user is authenticated according to the comparison result,
Wherein the key image generating unit extracts histogram information of the original image and then selects and extracts a predetermined region as a histogram of the first key image and generates a remaining region as a histogram of the second key image,
Wherein the authentication performing unit completes the original histogram by combining the histogram of the first key image and the histogram of the second key image.
Wherein the key image generating unit includes a histogram extracting unit that extracts color histogram information from the original image through at least one extraction reference among color space selection, differential quantization, bin selection, weight application, and extraction region selection.
A key image generation unit generating a plurality of key images from the original image according to a selected key image generation algorithm;
A key image providing unit transmitting a first key image, which is one of the plurality of key images, to a user terminal;
A data storage unit for storing the original image and a second key image, which is the remaining one of the plurality of key images, in a database; And
Generating an image key by combining with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm when the first key image is input through the image input unit, And an authentication performing unit for determining whether the user is authenticated according to the comparison result,
Instead of storing the second key image in the database,
Wherein the key image providing unit distributes n (2 or more natural number) key images generated by the key image generating unit to n user terminals,
And if the n key images are all combined, the same image key as the original image is generated.
(b) generating a plurality of key images from the original image according to a key image generation algorithm selected by the key image generation unit;
(c) the key image providing unit transmits the first key image, which is one of the plurality of key images, to the user terminal, and the data storage unit stores the original image and the second key image, which is the remaining one of the plurality of key images, in the database step;
(d) receiving the first key image by the image input unit;
(e) generating an image key by combining the first key image input in step (d) with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm;
(f) determining whether the user is authenticated according to a result of comparing the image key and the original image,
Wherein in the step (b), the key image generating unit distributes each pixel of the original image so as to be reflected in only one of the plurality of key images and not to be reflected in the rest,
Wherein in the step (e), the authentication performing unit generates the video key by summing pixel values of pixel coordinates corresponding to the plurality of key images.
(b) generating a plurality of key images from the original image according to a key image generation algorithm selected by the key image generation unit;
(c) the key image providing unit transmits the first key image, which is one of the plurality of key images, to the user terminal, and the data storage unit stores the original image and the second key image, which is the remaining one of the plurality of key images, in the database step;
(d) receiving the first key image by the image input unit;
(e) generating an image key by combining the first key image input in step (d) with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm;
(f) determining whether the user is authenticated according to a result of comparing the image key and the original image,
In the step (b), the key image generator divides the color space element value of each pixel of the original image into the plurality of key images, and then, for a portion to which the color space element value is not allocated, A value smaller than the spatial element value is applied,
Wherein in the step (e), the authentication performing unit generates the image key by selecting a maximum value among color space element values for pixel coordinates corresponding to the plurality of key images. Way.
(b) generating a plurality of key images from the original image according to a key image generation algorithm selected by the key image generation unit;
(c) the key image providing unit transmits the first key image, which is one of the plurality of key images, to the user terminal, and the data storage unit stores the original image and the second key image, which is the remaining one of the plurality of key images, in the database step;
(d) receiving the first key image by the image input unit;
(e) generating an image key by combining the first key image input in step (d) with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm;
(f) determining whether the user is authenticated according to a result of comparing the image key and the original image,
In the step (b), the key image generator divides the color space element value of each pixel of the original image into the plurality of key images, and then, for a portion to which the color space element value is not allocated, A value greater than or equal to the spatial element value is applied,
Wherein in the step (e), the authentication performing unit generates the image key by selecting a minimum value among color space element values for pixel coordinates corresponding to the plurality of key images, .
(b) generating a plurality of key images from the original image according to a key image generation algorithm selected by the key image generation unit;
(c) the key image providing unit transmits the first key image, which is one of the plurality of key images, to the user terminal, and the data storage unit stores the original image and the second key image, which is the remaining one of the plurality of key images, in the database step;
(d) receiving the first key image by the image input unit;
(e) generating an image key by combining the first key image input in step (d) with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm;
(f) determining whether the user is authenticated according to a result of comparing the image key and the original image,
In the step (b), the key image generating unit extracts the histogram information of the original image, and then selects and extracts a certain region as a histogram of the first key image, and generates the remaining region as a histogram of the second key image In addition,
Wherein the authentication performing unit completes the original histogram by combining the histogram of the first key image and the histogram of the second key image in step (e).
(b) generating a plurality of key images from the original image according to a key image generation algorithm selected by the key image generation unit;
(c) the key image providing unit transmits the first key image, which is one of the plurality of key images, to the user terminal, and the data storage unit stores the original image and the second key image, which is the remaining one of the plurality of key images, in the database step;
(d) receiving the first key image by the image input unit;
(e) generating an image key by combining the first key image input in step (d) with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm;
(f) determining whether the user is authenticated according to a result of comparing the image key and the original image,
And providing the thumbnail or the second key image corresponding to the original image as a hint image for receiving the first key image before the step (d).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160019453A KR101752659B1 (en) | 2016-02-19 | 2016-02-19 | Image key certification method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160019453A KR101752659B1 (en) | 2016-02-19 | 2016-02-19 | Image key certification method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
KR101752659B1 true KR101752659B1 (en) | 2017-07-03 |
Family
ID=59357928
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020160019453A KR101752659B1 (en) | 2016-02-19 | 2016-02-19 | Image key certification method and system |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101752659B1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111914283A (en) * | 2020-08-20 | 2020-11-10 | 绍兴市麦芒智能科技有限公司 | File electronic signature algorithm based on big data block chain |
KR20220064498A (en) * | 2020-11-12 | 2022-05-19 | 주식회사 미래기술연구소 | Method of identity authentication using by computer generated hologram |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006236213A (en) * | 2005-02-28 | 2006-09-07 | Digitalact:Kk | Authentication system |
-
2016
- 2016-02-19 KR KR1020160019453A patent/KR101752659B1/en active IP Right Grant
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006236213A (en) * | 2005-02-28 | 2006-09-07 | Digitalact:Kk | Authentication system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111914283A (en) * | 2020-08-20 | 2020-11-10 | 绍兴市麦芒智能科技有限公司 | File electronic signature algorithm based on big data block chain |
CN111914283B (en) * | 2020-08-20 | 2024-03-26 | 释空(上海)品牌策划有限公司 | File electronic signature algorithm based on big data block chain |
KR20220064498A (en) * | 2020-11-12 | 2022-05-19 | 주식회사 미래기술연구소 | Method of identity authentication using by computer generated hologram |
KR102454115B1 (en) | 2020-11-12 | 2022-10-14 | 주식회사 미래기술연구소 | Method of identity authentication using by computer generated hologram |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Aditya et al. | I-pic: A platform for privacy-compliant image capture | |
US20160048837A1 (en) | Method and system for verifying user identity using card features | |
KR101710050B1 (en) | Image identification systems and method | |
US10469701B2 (en) | Image processing method that obtains special data from an external apparatus based on information multiplexed in image data and apparatus therefor | |
CN106330464A (en) | Identity authentication method, device and system | |
CN101277367B (en) | Image processing apparatus, image forming apparatus, image processing system, and image processing method | |
CN102985933A (en) | Distinguishing live faces from flat surfaces | |
US10708056B2 (en) | Information processing method, terminal and computer storage medium | |
Armas Vega et al. | Copy-move forgery detection technique based on discrete cosine transform blocks features | |
US20220284448A1 (en) | Anti-counterfeiting and encryption method based on local random image transformation technique | |
KR101752659B1 (en) | Image key certification method and system | |
Galdi et al. | Exploring new authentication protocols for sensitive data protection on smartphones | |
KR101603201B1 (en) | Image key certification method and system using color histogram and texture information of image | |
WO2019131858A1 (en) | Personal authentication method and personal authentication device | |
EP3915221B1 (en) | Offline interception-free interaction with a cryptocurrency network using a network-disabled device | |
KR101717079B1 (en) | Image key certification method and system related to redundancy of color histogram information | |
KR101715655B1 (en) | Image key certification method and system using color histogram and texture information of image | |
WO2017047862A1 (en) | Image key authentication method and system, which use color histogram and texture information of images | |
CN106780668B (en) | Method, system and mobile device for realizing visual display of user personal information data label | |
KR102187661B1 (en) | Method and System for Playing Augmented Reality Photograph | |
Lekshmi et al. | Source camera identification of image for forensic analysis using sensor fingerprints | |
JP5301365B2 (en) | Authentication card, card authentication terminal, card authentication server, and card authentication system | |
Ogla | Symmetric-Based steganography technique using spiral-searching method for HSV color images | |
CN111382296A (en) | Data processing method, device, terminal and storage medium | |
Ramavathu et al. | A framework for secure mobile cloud computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |