On Monday, November 25, 2019 at 12:53:10 AM UTC-8, Gert wrote:
I have a black-box system that ingests digital images, can perform a
number of transformations on it, and later spits some of them out in
random order. My goal is to create an algorithm to generate digital
images I sent into the system so that I can identify them when/if they
come out, and tell which kind of transformations they have undergone.
There are some watermark systems for digital images, such as JPG,
that depend on some property of the less significant bits of the
image. Some can survive some transforms, though the usual intent
is to make illegal copying, possibly with transforms, difficult.
(Some even to detect scanning of a printed image.)
It sounds like you are not trying to detect illegal copying,
but only legal transforms. (That is, no nefarious intent.)
As above, many depend on changing the less significant bits,
and assuming that can survive some transforms.
If there is no nefarious intent, you can ask yourself what effect
each transformation will cause and plan accordingly.
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)