KR101752659B1 - Image key certification method and system - Google Patents

Image key certification method and system Download PDF

Info

Publication number
KR101752659B1
KR101752659B1 KR1020160019453A KR20160019453A KR101752659B1 KR 101752659 B1 KR101752659 B1 KR 101752659B1 KR 1020160019453 A KR1020160019453 A KR 1020160019453A KR 20160019453 A KR20160019453 A KR 20160019453A KR 101752659 B1 KR101752659 B1 KR 101752659B1
Authority
KR
South Korea
Prior art keywords
key
image
unit
images
key image
Prior art date
Application number
KR1020160019453A
Other languages
Korean (ko)
Inventor
민운기
Original Assignee
민운기
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 민운기 filed Critical 민운기
Priority to KR1020160019453A priority Critical patent/KR101752659B1/en
Application granted granted Critical
Publication of KR101752659B1 publication Critical patent/KR101752659B1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F17/30244
    • G06F17/30247
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

A video key authentication method and system are disclosed. The video key authentication system according to an embodiment of the present invention includes a video input unit for receiving or selecting an original video to be used as a video key for user authentication; A key image generation unit generating a plurality of key images from the original image according to a selected key image generation algorithm; A key image providing unit transmitting a first key image, which is one of the plurality of key images, to a user terminal; A data storage unit for storing the original image and a second key image, which is the remaining one of the plurality of key images, in a database; And generating an image key in combination with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm when the first key image is input through the image input unit, And an authentication performing unit for determining whether the user is authenticated according to the comparison result.

Description

[0001] Image key authentication method and system [0002]

The present invention relates to a video key authentication method and system.

With the development of the Internet, the number of networks connected to the Internet has increased rapidly, and the scope and content of information on the Internet has increased widely. Under such an Internet environment, various types of web services (e. G., E-commerce) as well as new types of web services have been developed to be applied to the Internet.

The web service provider system generally uses an ID and a password for identifying and authenticating a certain user for management and security reasons of the user. If you want a stronger authentication, you can use an encrypted public certificate, a security card (a random numbered array card), and a phone certificate. These methods can also help enhance authentication security when used in conjunction with each other.

As a related art, a system and a method for performing authentication only for a user registered in Korean Patent Laid-open No. 10-2015-0081387 are disclosed.

Korean Patent Publication No. 10-2015-0081387 (date of publication July 14, 2015) - User authentication system and method

Therefore, the present invention is to provide a video key authentication method and system using one or more key images generated from one original image as a key for user authentication based on an attribute of an image.

The present invention provides an image key authentication method and system that can not restore an original image using only a key image, thereby enhancing authentication security.

Other objects of the present invention will become more apparent through the following preferred embodiments.

According to an aspect of the present invention, there is provided an image processing apparatus comprising: a video input unit receiving or selecting an original image to be used as a video key for user authentication; A key image generation unit generating a plurality of key images from the original image according to a selected key image generation algorithm; A key image providing unit transmitting a first key image, which is one of the plurality of key images, to a user terminal; A data storage unit for storing the original image and a second key image, which is the remaining one of the plurality of key images, in a database; And generating an image key in combination with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm when the first key image is input through the image input unit, And an authentication performing unit for determining whether the user is authenticated according to the comparison result.

The key image generation algorithm and the authentication execution algorithm may be configured to generate and combine key images by one of a pixel maximum value (max) method, a pixel minimum value (min) method, a pixel distribution method, and a histogram method.

Wherein the key image generation unit distributes the pixels of the original image so that each of the pixels of the original image is reflected in only one of the plurality of key images and is not reflected to the rest, And the image key may be generated by adding pixel values to the coordinates.

Wherein the key image generating unit divides the color space element value of each pixel of the original image into the plurality of key images and then outputs a value less than a color space element value of the original image to a portion to which the corresponding color space element value is not allocated And the authentication performing unit may generate the image key by selecting a maximum value among the color space element values for the pixel coordinates corresponding to the plurality of key images.

The key image generation unit may divide the color space element value of each pixel of the original image into the plurality of key images, and then, when the color space element value is not allocated, a value equal to or greater than the color space element value of the original image And the authentication performing unit may generate the video key by selecting a minimum value among the color space element values for the pixel coordinates corresponding to the plurality of key images.

Wherein the key image generating unit extracts the histogram information of the original image and then extracts a predetermined region as a histogram of the first key image and extracts the remaining region as a histogram of the second key image, The original histogram can be completed by combining the histogram of the first key image and the histogram of the second key image.

The key image generating unit may include a histogram extracting unit that extracts color histogram information from the original image through at least one extraction criterion among color space selection, differential quantization, bin selection, weight application, and extraction region selection.

Instead of storing the second key image in the database, the key image providing unit may distribute n (two or more natural number) key images generated by the key image generating unit to n user terminals, If the images are combined, the same image key as the original image can be generated.

And a hint image providing unit for providing a thumbnail corresponding to the original image or the second key image as a hint image for receiving the first key image.

According to another aspect of the present invention, there is provided an image processing method comprising the steps of: (a) receiving or selecting an original image to be used as a video key of a user authentication; (b) generating a plurality of key images from the original image according to a key image generation algorithm selected by the key image generation unit; (c) the key image providing unit transmits the first key image, which is one of the plurality of key images, to the user terminal, and the data storage unit stores the original image and the second key image, which is the remaining one of the plurality of key images, in the database step; (d) receiving the first key image by the image input unit; (e) generating an image key by combining the first key image received in step (d) with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm; (f) determining whether the user is authenticated according to a result of comparing the video key and the original video, and a recording medium on which the program for performing the authentication is recorded.

Wherein in the step (b), the key image generation unit distributes the pixels of the original image in units of pixels so that each of the pixels of the original image is reflected only in one of the plurality of key images and not in the rest, and in the step (e) The image key may be generated by adding pixel values to pixel coordinates corresponding to the plurality of key images.

In the step (b), the key image generator divides the color space element value of each pixel of the original image into the plurality of key images, and then, for a portion to which the color space element value is not allocated, Wherein the authentication execution unit selects a maximum value among color space element values for pixel coordinates corresponding to the plurality of key images in step (e) Can be generated.

In the step (b), the key image generator divides the color space element value of each pixel of the original image into the plurality of key images, and then, for a portion to which the color space element value is not allocated, (E), the authentication performing unit generates the video key by selecting a minimum value among the color space element values for the pixel coordinates corresponding to the plurality of key images I can do it.

In the step (b), the key image generating unit extracts the histogram information of the original image, and then selects and extracts a certain region as a histogram of the first key image, and generates the remaining region as a histogram of the second key image In step (e), the authentication performing unit may combine the histogram of the first key image and the histogram of the second key image to complete the original histogram.

And providing the thumbnail or the second key image corresponding to the original image as a hint image for receiving the first key image before the step (d).

Other aspects, features, and advantages will become apparent from the following drawings, claims, and detailed description of the invention.

According to the present invention, there is an effect that one or more key images generated from one original image are used as a key for user authentication based on an attribute of the image.

In addition, since the original image can not be restored by only the key image, authentication security can be enhanced.

1 is a block diagram of a video key authentication system according to an embodiment of the present invention;
2 is a flowchart of a key image generation method in a video key authentication system according to an embodiment of the present invention,
3 is a flowchart of a method of performing authentication in a video key authentication system according to an embodiment of the present invention,
4A is a diagram illustrating a key image generation algorithm according to the first embodiment,
4B is a diagram showing an authentication performing algorithm according to the first embodiment,
5A is a diagram illustrating a key image generation algorithm according to the second embodiment,
5B is a diagram showing an authentication performing algorithm according to the second embodiment,
6 is a diagram illustrating a key image generation algorithm according to the third embodiment.

While the invention is susceptible to various modifications and alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described in detail. It is to be understood, however, that the invention is not to be limited to the specific embodiments, but includes all modifications, equivalents, and alternatives falling within the spirit and scope of the invention.

It is to be understood that when an element is referred to as being "connected" or "connected" to another element, it may be directly connected or connected to the other element, . On the other hand, when an element is referred to as being "directly connected" or "directly connected" to another element, it should be understood that there are no other elements in between.

The terms first, second, etc. may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.

The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. The singular expressions include plural expressions unless the context clearly dictates otherwise. In this specification, the terms "comprises" or "having" and the like refer to the presence of stated features, integers, steps, operations, elements, components, or combinations thereof, But do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, or combinations thereof.

It is to be understood that the components of the embodiments described with reference to the drawings are not limited to the embodiments and may be embodied in other embodiments without departing from the spirit of the invention. It is to be understood that although the description is omitted, multiple embodiments may be implemented again in one integrated embodiment.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Reference will now be made in detail to the preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the like elements throughout. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings. In the following description, well-known functions or constructions are not described in detail since they would obscure the invention in unnecessary detail.

In this specification, an image refers to a still image and may be represented by an image. The image intuitively conveys information and meaning to a person more than texts such as letters, numbers, and symbols. Thus, when a video is used as an authentication key, it may be more useful than a textual password in certain fields.

1 is a block diagram of a video key authentication system according to an embodiment of the present invention.

The video key authentication system according to an embodiment of the present invention uses a key image generated based on an original image for user authentication.

1, the video key authentication system 100 includes an image input unit 110, a key image generating unit 120, a key image providing unit 130, a data storing unit 140, and an authentication performing unit 150 . The hint image providing unit 160 may further include the hint image providing unit 160 according to the embodiment.

The image input unit 110 may receive an original image to be stored in the database 190 and / or an input image (key image) for authentication together with a user ID. The input original image may be an arbitrary image, a still image photographed through a camera provided in the user terminal, or a partial screen captured in a moving image.

In this embodiment, the original image is stored in the database 190 in accordance with the user ID. In addition, a thumbnail for the original image may be stored together. Here, the thumbnail is a hint image provided for future user authentication. The thumbnail may be reduced in size only to the original image, or may be subjected to color modulation or morphological modification to prevent illegal use through capturing.

Also, in the database 190, a key image generation algorithm corresponding to an image distribution rule for generating a key image from the original image and an authentication execution algorithm corresponding to an image restoration rule for generating a video key from the key image are stored. The key image generation algorithm and the authentication execution algorithm may be matched to each other, or one or more algorithm matching sets may be provided.

At least one of a pixel maximum value (max) method, a pixel minimum value (min) method, a pixel distribution method, and a histogram distribution method may be applied to an algorithm matching set between a key image generation algorithm and an authentication execution algorithm. This will be described later in detail with reference to related drawings.

The key image generation unit 120 generates a plurality of key images based on the original image by applying one algorithm selected corresponding to the user ID among the key image generation algorithms stored in the database 190.

The key image providing unit 130 provides one of the plurality of key images generated by the key image generating unit 120 to a designated user terminal corresponding to the input user ID together with the original image. The user terminal is an electronic terminal capable of data communication, and may be one of, for example, a mobile communication terminal, a smart phone, a tablet PC, a general-purpose PC, or the like.

If the user ID is related to the group user and n (two or more natural number) users need to perform authentication together, the key image generating unit 120 can generate n key images, The studying unit 130 may distribute and distribute n different key images to n user terminals respectively designated for n users.

The data storage unit 140 stores the original image inputted through the image input unit 110 by matching with the user ID. The stored original image is used as image data for comparison with the image key obtained by combining key images in the authentication process in the future.

In addition, the data storage unit 140 stores the key images of the plurality of key images generated by the key image generation unit 120, excluding the key images provided to the user terminal by the key image providing unit 130, And stored in the database 190. The remaining key image stored in the database 190 may be utilized to acquire the image key in combination with the key image input through the user terminal in the subsequent authentication process.

When a key image for authentication is inputted through the image input unit 110, the authentication performing unit 150 combines key images corresponding to the user ID according to an authentication execution algorithm stored in the database 190 to generate a video key do. Then, the generated image key is compared with the original image to determine the identity, and the success or failure of the user authentication is determined. For example, if the image key in which a plurality of key images are combined is substantially equal to the original image within a predetermined error range, it can be determined that the user authentication is successful.

In addition, the video key authentication system 100 may further include a hint image providing unit 160 for providing (e.g., displaying) a hint image for giving a hint about a video key to a user who wishes to perform user authentication.

The hint image may be a key image stored in the database 190. The key image stored in the database 190 may be a sibling of another key image generated in the original image, and may provide a hint to suggest a key image transmitted to the user terminal through some similarity between the two.

Alternatively, the hint image may be a thumbnail image of the original image, and may help the user to input the key image for authentication by allowing the user to check what the original image has been pre-registered for image authentication.

It is difficult to restore 100% of the original image used as a video key by thumbnail alone. However, in this case, there is a concern that the thumbnail, which is a hint image, may be reduced due to the camera shots or screen captures in the hint image providing process. In addition to the size reduction of the original image, It is possible to raise the security so that the image characteristic value can be changed in the case of illegal use so that it can not be used for authentication.

In the present embodiment, an original image as a basis for generating a key image is input through the image input unit 110, but this is merely an example. If necessary, the input image may be input through the image input unit 110 The image data selected from the plurality of image data previously stored in the database 190 of the image key authentication system 100 may be used as an original image for generating a key image for the user.

Hereinafter, a key image generation method and an authentication method performed in the image key authentication system 100 will be described in detail with reference to related drawings.

FIG. 2 is a flowchart of a key image generation method in an image key authentication system according to an embodiment of the present invention, and FIG. 3 is a flowchart of a method of performing authentication in an image key authentication system according to an embodiment of the present invention.

Referring to FIG. 2, the image input unit 110 receives an original image (step S10). The original image may be selected from the image data stored in advance in the database 190 instead of receiving the original image.

The key image generating unit 120 selects a key image generating algorithm related to an image distribution rule for generating a key image (step S15). The key image generation algorithm may be automatically selected by the image key authentication system 100 or selected based on user input. The key image generation algorithm may be a pixel maximum value (max) method, a pixel minimum value (min) method, a pixel distribution method, a histogram distribution method, or the like.

The key image generation unit 120 generates a plurality of key images from the original image according to the selected key image generation algorithm (step S20).

If there is only one user to provide the key image, two key images may be generated and one may be stored in the database 190. And the other is transmitted from the key image providing unit 130 to the user terminal corresponding to the user ID (step S25). The key image transmitted to the user terminal may be used as a means for user authentication when the user performs the image key authentication later.

If the user providing the key image is n (natural number of 2 or more), n key images can be generated. Alternatively, n + 1 key images may be generated and one may be stored in the database 190.

In this case, the key image providing unit 130 transmits n key images to user terminals respectively designated to n users (step S30). The n key images transmitted to the n user terminals can be used as means for authenticating the user when the user group performs the image key authentication in the future, and normal user authentication can be performed only when all the key images are inputted There will be.

Referring now to Figure 3, a method of performing authentication is illustrated.

The image input unit 110 receives the user ID and the key image from the user terminal (step S50).

The authentication performing unit 150 selects an authentication performing algorithm set corresponding to the user ID (step S55). The authentication execution algorithm is predetermined in the key image generation process, which is a pair of image combination rules with a key image generation algorithm for generating a key image.

The authentication performing unit 150 generates a video key from the key image according to the selected authentication performing algorithm (step S60).

Here, the key image (storage key image) stored in the database 190 and the key image (input key image) input in step S50 may be combined with the user ID to generate the image key.

Alternatively, when n key images are input from n user terminals by authentication for a user group, the n key images input may be scrambled to generate an image key.

The authentication performing unit 150 compares the original image stored in the database 190 with the generated image key and the user ID (step S65).

If the image key and the original image are substantially equal to each other within a specified error range, it is determined that the key image input from the user terminal is true and it is determined that the user authentication is successful (step S70). Further, it is possible to perform subsequent processing (e.g., door opening, login success, successful payment, etc.) in accordance with the authentication success.

However, if the image key is different from the original image, it is determined that the key image input from the user terminal is false and it is determined that the user authentication has failed (step S75). Further, it is possible to perform subsequent processing (for example, non-opening of the door, failure of login, failure of payment, etc.) in response to the authentication failure.

In this embodiment, before receiving the key image in step S50, the hint image providing unit 160 may provide a hint image of the original image registered for image security to the user who wants to log in. The hint image may be a thumbnail that is reduced in size with respect to the original image, and may be provided with some color or shape modulated to prevent illegal use by shooting or capturing a hint image.

The key image generating method and the authentication performing method according to the present invention can be embodied as computer readable codes on a computer readable recording medium. The computer-readable recording medium includes all kinds of recording media storing data that can be decoded by a computer system. For example, it may be a ROM (Read Only Memory), a RAM (Random Access Memory), a magnetic tape, a magnetic disk, a flash memory, an optical data storage device, or the like. In addition, the computer-readable recording medium may be distributed and executed in a computer system connected to a computer network, and may be stored and executed as a code readable in a distributed manner.

Hereinafter, a key image generation algorithm and an authentication performance algorithm will be described with reference to the related drawings.

FIG. 4A is a diagram illustrating a key image generation algorithm according to the first embodiment, and FIG. 4B is a diagram illustrating an authentication performing algorithm according to the first embodiment.

A pixel distribution method is applied to the key image generation algorithm and the authentication performing algorithm according to the first embodiment.

The original image 200 is composed of a plurality of pixels having a two-dimensional array, and a pixel value corresponding to [R, G, B] is assigned to one pixel. Various color spaces such as an RGB color space, a YCbCr color space, and an HSV color space are defined and used. Hereinafter, the RGB color space will be mainly described, but the same contents may be applied to other color spaces. In this case, the pixel value may be a value for a color space element constituting each color space (Y, Cb, Cr for the YCbCr color space, H, S, V for the HSV color space).

In this case, when two key images 210 and 220 are generated from the original image 200, the pixels are distributed in units of pixels so that each of the pixels is reflected in only one of the two key images 210 and 220, .

4A, the pixel values of the original image 200 are applied to the first key image 210, the pixel values of the original image 200 are applied to the (1, 2), (2, 1) The pixel value of [0, 0, 0] is applied. The pixel values of the original image 200 are applied to the pixel coordinates of (1,1), (1,3), and (2,2) in the second key image 220, and the pixel values of [0.0. 0] is applied.

The first key image 210 and the second key image 220 can not respectively restore the original image 200 alone. However, when the pixel values corresponding to the pixel coordinates corresponding to the first key image 210 and the second key image 220 are summed, it is possible to generate the same image key 230 as the original image 200 (See FIG. 4B).

FIG. 5A is a diagram illustrating a key image generation algorithm according to the second embodiment, and FIG. 5B is a diagram illustrating an authentication performing algorithm according to the second embodiment.

The pixel maximum value (max) method is applied to the key image generation algorithm and the authentication performing algorithm according to the second embodiment.

The original image 300 is composed of a plurality of pixels having a two-dimensional array, and pixel values corresponding to [R, G, B] are assigned to one pixel.

In this case, when two key images 310 and 320 are generated from the original image 300, R, G, and B values included in one pixel are distinguished, and R, G, And the maximum value of the B value is the R, G, and B values of the corresponding pixel of the image key 330.

For example, in (1, 2) pixel coordinates of the original image 300 in FIG. 5A, [R, G, B] = [20,20,20]. In this case, the RGB values of the (1, 2) pixel coordinates of the first key image 310 are [0,10,20] and the RGB values of the (1, 2) pixel coordinates of the second key image 320 are [ 20, 20, 0].

The first key image 310 and the second key image 320 can not restore the original image 300 alone. However, if only the maximum value is taken for each of the R, G, and B values of the pixel coordinates corresponding to the first key image 310 and the second key image 320, (1, 2) of the image key 330, Pixel coordinates have RGB values [20,20,20]. Which is equal to the RGB value of the (1, 2) pixel coordinates of the original image 330.

For this purpose, the R, G and B values of each pixel of the original image 300 are distributed to the two key images 310 and 320 in the key image generation process, The value of R, G, B of the original image 300 may be applied to the maximum value in the image key acquisition process.

Although the present embodiment has been described mainly on the maximum value, it goes without saying that a similar principle can be applied to the pixel minimum value min method. In the case of the pixel minimum value method, after dividing the R, G, and B values of each pixel of the original image into two key images in the key image generation process, A value equal to or greater than the R, G, and B values of the image may be applied so that there is no error when applying the minimum value in the image key acquisition process in the future.

Also, in the present embodiment, the description has been made mainly on the RGB values, but it goes without saying that a similar principle can be applied to the YCbCr value.

FIG. 6 is a diagram illustrating a key image generation algorithm according to the third embodiment.

The histogram method is applied to the key image generation algorithm according to the third embodiment.

In the case of images, color histogram information can be utilized as unique feature values.

The key image generating unit 120 may include a histogram extracting unit (not shown) for extracting the color histogram information from the original image. In this case, it is possible to extract a histogram feature vector showing a high degree of accuracy and high image quality while enhancing security through various variables such as color space selection, differential quantization, bin selection, weight application, and extraction region selection.

First, the histogram extractor divides one image into seven color spaces, and selects a color space to analyze the color histogram among the color spaces.

Basically, the color is determined by the characteristics of the light reflected from the object. Based on the three primary colors designated for the purpose of standardization in the CIE, the color is defined as RGB color space, opponent color color space, YCbCr color space, HSV color space, Various color spaces are defined and used. In the present embodiment, it is assumed that each pixel of the image is placed in the RGB color space for the sake of understanding and explanation of the invention.

Each pixel of the image can be represented by a combination of red (R), green (G), and blue (B), and placed in seven color histogram spaces from three dimensions to one dimension based on the RGB values of each pixel .

If each pixel of the image basically has a YCbCr value, the RGB value may be obtained using the following equation, which is a conversion equation between the YCbCr value and the RGB value, and then placed in the seven color histogram spaces.

[Equation 1]

Figure 112016016484273-pat00001

First, one pixel can be arranged in an RGB (Red, Green, Blue) space, which is a cubic space (three-dimensional space) in which X, Y, and Z axes respectively represent R, G, and B values according to RGB values. Also, a GB (Green, Blue) space corresponding to the YZ flat name in a square space (two-dimensional space) in which two of R, G and B are combined, a BR (Blue, Red) space corresponding to the XZ plane, and an XY plane (Red, Green) space, respectively. In addition, a R (Red) space corresponding to the X axis, a G (Green) space corresponding to the Y axis, and a B (Green) space corresponding to the Z axis are linear spaces (one-dimensional spaces) in which R, G, and B are arranged one- (Blue) space, respectively.

That is, one pixel is arranged in a total of seven color spaces including RGB space as a three-dimensional space, GB space as a two-dimensional space, BR space, RG space, R space as a one-dimensional space, G space, .

If all pixels belonging to the image are arranged in seven color spaces from one dimension to three dimensions based on RGB values, a color histogram for seven color spaces can be obtained.

In this embodiment, the histogram extracting unit selects a color space to be used for key image generation among the color histograms of the seven color spaces. The selection of the color space may be based on user input or according to a predetermined algorithm according to an extraction criterion. In this case, what color space is selected can be used as security logic for authentication.

Next, the histogram extracting unit applies discrimination (irregularly) instead of equalizing the empty region dividing intervals in the process of performing quantization to divide a bin, which is a unit for accumulating frequency counts, into seven color spaces can do. As a method of discriminative quantization, for example, among the seven color spaces, there may be a method in which a color space to be emphasized has a smaller space division interval relatively to the other color space than the other color space.

For example, the B space and the R space are divided into eight empty regions, but the G space may be divided into sixteen empty regions. That is, the G space is finer than the B space or the R space, so that green can be more finely distinguished than blue or red.

In the case of applying the differential quantization, the interval between the bins is made irregular rather than being constant, so that the bin can be used as the security logic itself.

The total number of beans can be reduced compared to delineating beans for every color space, thereby reducing the computation time in the authentication process, thereby enabling quick authentication. Also, at the same time, the accuracy of authentication can be maximized by relatively finely dividing the color space to emphasize accuracy.

In addition, the histogram extracting unit can select a bin to be used for authentication when the image is divided into a plurality of bins through quantization for seven color spaces. All of the bins may be selected, and one or more bins for user authentication may be arbitrarily selected, and the feature vectors may be extracted based on the frequencies belonging to the bins by limiting the selected bins to the selected bins. In this case, which bin is selected can be used as security logic in authentication.

When a plurality of bins are selected, the order of using or storing the selected plurality of bins can be determined based on the user's input or according to a predetermined algorithm. In this case, the selected sequence of beans can also be used as security logic for authentication.

In addition, the histogram extracting unit may select a bin to be emphasized among the bins divided through quantization, and weight the frequency of the bin. Here, the weight reflects the degree of interest of the color gamut.

For example, by applying a predetermined weight only to four bins whose G value is close to 255 out of the 16 bins divided for the G space, a high score is obtained for a case where a green value of 0 to 255 is a large G value .

Or RGB space, by applying a predetermined weight only to bins having a G value close to 255 and an R value and a B value close to 0, the red and blue components are small and the number of pixels having a large green component is large A high score can be given to the image.

Further, the histogram extracting unit selects an area from which to extract a feature vector by the color histogram. A color histogram can be constructed only for a part of the image but not for the whole area, so that the feature vector can be extracted. In this case, which area is selected as the extraction area can be used as security logic in authentication.

The histogram extracting unit can extract the color histogram vector by finding the bin matching each pixel of the image based on the extraction criterion and calculating the matching frequency of each of the bins for all the pixels as the frequency. Then, a feature vector for a spatial average position and a distribution can be generated with respect to pixels belonging to the same bin.

The histogram extracting unit extracts the feature vector from the extracted feature vector based on extraction criteria such as color space selection, differential quantization, bin selection, weight application, and extraction region selection, And the like may be performed.

6, when the histogram 400 for the original image is extracted by the histogram extracting unit 120, the key image generating unit 120 selects and extracts the predetermined region 410 as the histogram of the first key image . Then, the predetermined region 410 is extracted and the remaining region 420 is generated as a histogram of the second key image. In this case, the original histogram 400 can be completed only when the first key image histogram and the second key image histogram are combined.

The HSV color space, the HSL (lightness) color space, the HSI (intensity) color space, and the YCbCr color space are used in the key image generation process in the image key authentication system according to the present embodiment. It is possible to apply the pixel maximum value method, the pixel minimum value method, the pixel distribution method, and the histogram method in the same manner.

The video key authentication system and method according to the present embodiment can be applied to the following use examples.

According to the first use example, it can be used for authentication at the time of login of a web site using a photograph.

Generally, websites use user IDs and passwords to authenticate users. If you want a stronger authentication, you can use an encrypted certificate and a security card (a random numbered array card). In addition, by using the image key authentication method according to the present embodiment, the key image extracted from the photograph can be used as the authentication key, so that the authentication can be made easier and more interesting.

According to the second usage example, the user authentication system using a photograph can be utilized as a locker in a hotel room.

The hotel room is equipped with lockers for valuables of travelers. Currently, lockers are managed by simply using numeric passwords. This is because the length of stay for guests is short. That is, it is inconvenient for users to generate IDs for issuance of authorized certificates, or to provide a security card (a random number array card).

However, there are travelers who feel uneasy about security just by using a password (typically four digits). Therefore, if the password is used together with the key image extracted from one of the photographs that the passengers have in the smartphone, it will be a convenient and interesting authentication method while providing stronger authentication.

According to the third usage example, it can be utilized when sending and receiving a text message (including an interactive text message such as a message of KakaoTalk), or when a photo is authenticated on a bulletin board.

When secretly sending and receiving characters between the same person as a lover, if the key images generated from one original image are distributed to each other, the key images are mutually authenticated so that the authenticators can send and receive characters only. If you want to see a related person by posting a notice on a bulletin board (for example, a group meeting board such as a line band), if one of the generated n key images is sent to a corresponding person, It will be useful for security.

It will be apparent to those skilled in the art that various modifications and variations can be made in the present invention without departing from the spirit or scope of the invention as defined in the appended claims. It will be understood that various modifications and changes may be made.

100: video key authentication system 110: video input unit
120: key image generating unit 130: key image providing unit
140: Data storage unit 150: Authentication performing unit
160: hint image providing unit 190: database

Claims (16)

A video input unit for receiving or selecting an original image to be used as a video key for user authentication;
A key image generation unit generating a plurality of key images from the original image according to a selected key image generation algorithm;
A key image providing unit transmitting a first key image, which is one of the plurality of key images, to a user terminal;
A data storage unit for storing the original image and a second key image, which is the remaining one of the plurality of key images, in a database; And
Generating an image key by combining with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm when the first key image is input through the image input unit, And an authentication performing unit for determining whether the user is authenticated according to the comparison result,
Wherein the key image generating unit distributes the pixels of the original image so that each of the pixels of the original image is reflected in only one of the plurality of key images,
Wherein the authentication performing unit generates the image key by summing pixel values of pixel coordinates corresponding to the plurality of key images.
A video input unit for receiving or selecting an original image to be used as a video key for user authentication;
A key image generation unit generating a plurality of key images from the original image according to a selected key image generation algorithm;
A key image providing unit transmitting a first key image, which is one of the plurality of key images, to a user terminal;
A data storage unit for storing the original image and a second key image, which is the remaining one of the plurality of key images, in a database; And
Generating an image key by combining with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm when the first key image is input through the image input unit, And an authentication performing unit for determining whether the user is authenticated according to the comparison result,
And a hint image providing unit for providing a thumbnail corresponding to the original image or the second key image as a hint image for receiving the first key image.
delete A video input unit for receiving or selecting an original image to be used as a video key for user authentication;
A key image generation unit generating a plurality of key images from the original image according to a selected key image generation algorithm;
A key image providing unit transmitting a first key image, which is one of the plurality of key images, to a user terminal;
A data storage unit for storing the original image and a second key image, which is the remaining one of the plurality of key images, in a database; And
Generating an image key by combining with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm when the first key image is input through the image input unit, And an authentication performing unit for determining whether the user is authenticated according to the comparison result,
Wherein the key image generating unit divides the color space element value of each pixel of the original image into the plurality of key images and then outputs a value less than a color space element value of the original image to a portion to which the corresponding color space element value is not allocated To be applied,
Wherein the authentication performing unit generates the image key by selecting a maximum value among color space element values for pixel coordinates corresponding to the plurality of key images.
A video input unit for receiving or selecting an original image to be used as a video key for user authentication;
A key image generation unit generating a plurality of key images from the original image according to a selected key image generation algorithm;
A key image providing unit transmitting a first key image, which is one of the plurality of key images, to a user terminal;
A data storage unit for storing the original image and a second key image, which is the remaining one of the plurality of key images, in a database; And
Generating an image key by combining with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm when the first key image is input through the image input unit, And an authentication performing unit for determining whether the user is authenticated according to the comparison result,
The key image generation unit may divide the color space element value of each pixel of the original image into the plurality of key images, and then, when the color space element value is not allocated, a value equal to or greater than the color space element value of the original image And,
Wherein the authentication performing unit generates the image key by selecting a minimum value among color space element values for pixel coordinates corresponding to the plurality of key images.
A video input unit for receiving or selecting an original image to be used as a video key for user authentication;
A key image generation unit generating a plurality of key images from the original image according to a selected key image generation algorithm;
A key image providing unit transmitting a first key image, which is one of the plurality of key images, to a user terminal;
A data storage unit for storing the original image and a second key image, which is the remaining one of the plurality of key images, in a database; And
Generating an image key by combining with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm when the first key image is input through the image input unit, And an authentication performing unit for determining whether the user is authenticated according to the comparison result,
Wherein the key image generating unit extracts histogram information of the original image and then selects and extracts a predetermined region as a histogram of the first key image and generates a remaining region as a histogram of the second key image,
Wherein the authentication performing unit completes the original histogram by combining the histogram of the first key image and the histogram of the second key image.
The method according to claim 6,
Wherein the key image generating unit includes a histogram extracting unit that extracts color histogram information from the original image through at least one extraction reference among color space selection, differential quantization, bin selection, weight application, and extraction region selection.
A video input unit for receiving or selecting an original image to be used as a video key for user authentication;
A key image generation unit generating a plurality of key images from the original image according to a selected key image generation algorithm;
A key image providing unit transmitting a first key image, which is one of the plurality of key images, to a user terminal;
A data storage unit for storing the original image and a second key image, which is the remaining one of the plurality of key images, in a database; And
Generating an image key by combining with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm when the first key image is input through the image input unit, And an authentication performing unit for determining whether the user is authenticated according to the comparison result,
Instead of storing the second key image in the database,
Wherein the key image providing unit distributes n (2 or more natural number) key images generated by the key image generating unit to n user terminals,
And if the n key images are all combined, the same image key as the original image is generated.
delete delete (a) receiving or selecting an original image to be used as a video key of a user authentication;
(b) generating a plurality of key images from the original image according to a key image generation algorithm selected by the key image generation unit;
(c) the key image providing unit transmits the first key image, which is one of the plurality of key images, to the user terminal, and the data storage unit stores the original image and the second key image, which is the remaining one of the plurality of key images, in the database step;
(d) receiving the first key image by the image input unit;
(e) generating an image key by combining the first key image input in step (d) with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm;
(f) determining whether the user is authenticated according to a result of comparing the image key and the original image,
Wherein in the step (b), the key image generating unit distributes each pixel of the original image so as to be reflected in only one of the plurality of key images and not to be reflected in the rest,
Wherein in the step (e), the authentication performing unit generates the video key by summing pixel values of pixel coordinates corresponding to the plurality of key images.
(a) receiving or selecting an original image to be used as a video key of a user authentication;
(b) generating a plurality of key images from the original image according to a key image generation algorithm selected by the key image generation unit;
(c) the key image providing unit transmits the first key image, which is one of the plurality of key images, to the user terminal, and the data storage unit stores the original image and the second key image, which is the remaining one of the plurality of key images, in the database step;
(d) receiving the first key image by the image input unit;
(e) generating an image key by combining the first key image input in step (d) with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm;
(f) determining whether the user is authenticated according to a result of comparing the image key and the original image,
In the step (b), the key image generator divides the color space element value of each pixel of the original image into the plurality of key images, and then, for a portion to which the color space element value is not allocated, A value smaller than the spatial element value is applied,
Wherein in the step (e), the authentication performing unit generates the image key by selecting a maximum value among color space element values for pixel coordinates corresponding to the plurality of key images. Way.
(a) receiving or selecting an original image to be used as a video key of a user authentication;
(b) generating a plurality of key images from the original image according to a key image generation algorithm selected by the key image generation unit;
(c) the key image providing unit transmits the first key image, which is one of the plurality of key images, to the user terminal, and the data storage unit stores the original image and the second key image, which is the remaining one of the plurality of key images, in the database step;
(d) receiving the first key image by the image input unit;
(e) generating an image key by combining the first key image input in step (d) with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm;
(f) determining whether the user is authenticated according to a result of comparing the image key and the original image,
In the step (b), the key image generator divides the color space element value of each pixel of the original image into the plurality of key images, and then, for a portion to which the color space element value is not allocated, A value greater than or equal to the spatial element value is applied,
Wherein in the step (e), the authentication performing unit generates the image key by selecting a minimum value among color space element values for pixel coordinates corresponding to the plurality of key images, .
(a) receiving or selecting an original image to be used as a video key of a user authentication;
(b) generating a plurality of key images from the original image according to a key image generation algorithm selected by the key image generation unit;
(c) the key image providing unit transmits the first key image, which is one of the plurality of key images, to the user terminal, and the data storage unit stores the original image and the second key image, which is the remaining one of the plurality of key images, in the database step;
(d) receiving the first key image by the image input unit;
(e) generating an image key by combining the first key image input in step (d) with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm;
(f) determining whether the user is authenticated according to a result of comparing the image key and the original image,
In the step (b), the key image generating unit extracts the histogram information of the original image, and then selects and extracts a certain region as a histogram of the first key image, and generates the remaining region as a histogram of the second key image In addition,
Wherein the authentication performing unit completes the original histogram by combining the histogram of the first key image and the histogram of the second key image in step (e).
(a) receiving or selecting an original image to be used as a video key of a user authentication;
(b) generating a plurality of key images from the original image according to a key image generation algorithm selected by the key image generation unit;
(c) the key image providing unit transmits the first key image, which is one of the plurality of key images, to the user terminal, and the data storage unit stores the original image and the second key image, which is the remaining one of the plurality of key images, in the database step;
(d) receiving the first key image by the image input unit;
(e) generating an image key by combining the first key image input in step (d) with the second key image according to an authentication performing algorithm corresponding to the key image generating algorithm;
(f) determining whether the user is authenticated according to a result of comparing the image key and the original image,
And providing the thumbnail or the second key image corresponding to the original image as a hint image for receiving the first key image before the step (d).
A computer program for performing the method of any one of claims 11 to 15.
KR1020160019453A 2016-02-19 2016-02-19 Image key certification method and system KR101752659B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020160019453A KR101752659B1 (en) 2016-02-19 2016-02-19 Image key certification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020160019453A KR101752659B1 (en) 2016-02-19 2016-02-19 Image key certification method and system

Publications (1)

Publication Number Publication Date
KR101752659B1 true KR101752659B1 (en) 2017-07-03

Family

ID=59357928

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020160019453A KR101752659B1 (en) 2016-02-19 2016-02-19 Image key certification method and system

Country Status (1)

Country Link
KR (1) KR101752659B1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111914283A (en) * 2020-08-20 2020-11-10 绍兴市麦芒智能科技有限公司 File electronic signature algorithm based on big data block chain
KR20220064498A (en) * 2020-11-12 2022-05-19 주식회사 미래기술연구소 Method of identity authentication using by computer generated hologram

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006236213A (en) * 2005-02-28 2006-09-07 Digitalact:Kk Authentication system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006236213A (en) * 2005-02-28 2006-09-07 Digitalact:Kk Authentication system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111914283A (en) * 2020-08-20 2020-11-10 绍兴市麦芒智能科技有限公司 File electronic signature algorithm based on big data block chain
CN111914283B (en) * 2020-08-20 2024-03-26 释空(上海)品牌策划有限公司 File electronic signature algorithm based on big data block chain
KR20220064498A (en) * 2020-11-12 2022-05-19 주식회사 미래기술연구소 Method of identity authentication using by computer generated hologram
KR102454115B1 (en) 2020-11-12 2022-10-14 주식회사 미래기술연구소 Method of identity authentication using by computer generated hologram

Similar Documents

Publication Publication Date Title
Aditya et al. I-pic: A platform for privacy-compliant image capture
US20160048837A1 (en) Method and system for verifying user identity using card features
KR101710050B1 (en) Image identification systems and method
US10469701B2 (en) Image processing method that obtains special data from an external apparatus based on information multiplexed in image data and apparatus therefor
CN106330464A (en) Identity authentication method, device and system
CN101277367B (en) Image processing apparatus, image forming apparatus, image processing system, and image processing method
CN102985933A (en) Distinguishing live faces from flat surfaces
US10708056B2 (en) Information processing method, terminal and computer storage medium
Armas Vega et al. Copy-move forgery detection technique based on discrete cosine transform blocks features
US20220284448A1 (en) Anti-counterfeiting and encryption method based on local random image transformation technique
KR101752659B1 (en) Image key certification method and system
Galdi et al. Exploring new authentication protocols for sensitive data protection on smartphones
KR101603201B1 (en) Image key certification method and system using color histogram and texture information of image
WO2019131858A1 (en) Personal authentication method and personal authentication device
EP3915221B1 (en) Offline interception-free interaction with a cryptocurrency network using a network-disabled device
KR101717079B1 (en) Image key certification method and system related to redundancy of color histogram information
KR101715655B1 (en) Image key certification method and system using color histogram and texture information of image
WO2017047862A1 (en) Image key authentication method and system, which use color histogram and texture information of images
CN106780668B (en) Method, system and mobile device for realizing visual display of user personal information data label
KR102187661B1 (en) Method and System for Playing Augmented Reality Photograph
Lekshmi et al. Source camera identification of image for forensic analysis using sensor fingerprints
JP5301365B2 (en) Authentication card, card authentication terminal, card authentication server, and card authentication system
Ogla Symmetric-Based steganography technique using spiral-searching method for HSV color images
CN111382296A (en) Data processing method, device, terminal and storage medium
Ramavathu et al. A framework for secure mobile cloud computing

Legal Events

Date Code Title Description
E701 Decision to grant or registration of patent right
GRNT Written decision to grant