期刊文献+

基于压缩感知与小波域奇异值分解的图像认证 被引量:2

Image Authentication Using Compressive Sensing with Wavelet and Singular Value Decomposition
在线阅读 下载PDF
导出
摘要 提出了一种基于压缩感知与小波域奇异值分解的图像哈希认证新方法.该方法首先通过小波变换得到图像的低频子带,然后对低频子带进行基于块的奇异值分解,最后对产生的最大奇异值数组进行基于压缩感知的随机投影,产生哈希认证信息,并偕同原图像传送到接收端.图像接收端通过比较哈希信息完成图像认证,并通过利用传递的哈希信息重建原始图像的奇异值,进一步映射奇异值差值到图像像素域,从而实现对图像篡改的识别与定位.大量实验结果证明了该方法的有效性. A new hash based on image authentication scheme using compressive sensing with wavelet transform and singular value decomposition was proposed in this paper. The original image is first decomposed by wavelet transform to obtain low frequency subband, which is used to block based singular value decomposition. The hash information is generated by random projecting the maximum singular value data using compressive sensing, which is transmitted to receiver with the original image. In image receiver, the image authentication is achieved by comparing the received hash information and that generated by the received image. The detection and location of tampered image are accomplished by mapping the difference value of between singular value of the received image and that of the original image to image pixel domain. Experimental results has demonstrated the effectiveness of the proposed method.
作者 高志荣 吕进
出处 《中南民族大学学报(自然科学版)》 CAS 2010年第4期89-93,共5页 Journal of South-Central University for Nationalities:Natural Science Edition
基金 湖北省自然科学基金资助项目(2009CDA139) 中南民族大学自然科学基金资助项目(YZY10005) 中南民族大学大学生科研创新基金项目(KYCX100411B)
关键词 图像认证 篡改定位 压缩感知 小波变换 奇异值分解 Image authentication tamper location compressive sensing wavelet transform singular value decomposition
  • 相关文献

参考文献14

  • 1王国栋,刘粉林,汪萍,耿楠楠.一种篡改检测与篡改定位分离的图像认证方案[J].计算机学报,2007,30(10):1880-1888. 被引量:13
  • 2Venkatesan R,Koon S M,Jakubowski M H,et al.Robust image hashing[C] //CA.Proc IEEE Int Conf Image Processing.Vancouver:CA,2000:664-666.
  • 3Kozat S S,Venkatesan R,Mihcak M K.Robust perceptual image hashing via matrix invariants[C] //IEEE.Proc IEEE Int Conf Image Processing.Singapore:IEEE,2004.
  • 4Swaminathan A,Mao Yinian,Wu Min.Robust and secure image hashing[J].IEEE Trans Inf Forensics Security,2006,1(2):215-230.
  • 5Johnson M,Ramchandran K.Dither-based secure image hashing using distributed coding[C] //IEEE.Proc IEEE Int Conf Image Processing.Singapore:IEEE,2003:751-754.
  • 6Lin Y C,Varodayan D,Girod B.Image authentication based on distributed source coding[C] //IEEE.Proc IEEE Int Conf Image Processing.S Antonio:IEEE,2007:5-8.
  • 7Lin Y C,Varodayan D.Localization of tampering in contrast and brightness adjusted images using distributed source coding and expectation maximization[C] //IEEE.Proc IEEE Int Conf Image Processing,Lisbon:IEEE,2008:2 204-2 207.
  • 8Tagliasacchi M,Valenzise G.Hash-based identifica-tion of sparse image tampering[J].IEEE Transactions on image processing,2009,18(11):2 491-2 504.
  • 9Donoho D L.Compressed sensing[J].IEEE Trans Inform Theory,2006,52(4):1 289-1 306.
  • 10Goyal V K,Fletcher A K,Rangan S.Compressive sampling andlossy compression[J].IEEE Signal Processing Magazine,2008,25(2):48-56.

二级参考文献57

共引文献97

同被引文献21

  • 1张立和,伍宏涛,胡昌利.基于三维Gabor变换的视频水印算法[J].软件学报,2004,15(8):1252-1258. 被引量:16
  • 2张航,罗大庸.图像盲复原算法研究现状及其展望[J].中国图象图形学报(A辑),2004,9(10):1145-1152. 被引量:53
  • 3许君一,熊昌镇,齐东旭,黄继武.量化水印算法分析[J].通信学报,2006,27(3):15-27. 被引量:9
  • 4Kashiflqbal and Rosalina Abdul Salam. Underwater Image Enhancement Using an Integrated Color Model[J]. IAENG Imernational Journal of Computer Science, 2007,34(2).
  • 5Gwena?l Do?rr,Jean-Luc Dugelay.A guide tour of video watermarking[J].Signal Processing: Image Communication.2003(4)
  • 6Wim Sweldens.The Lifting Scheme: A Construction of Second Generation Wavelets[].SIAM Journal on Mathematical Analysis.1998
  • 7Liu Ruizhen,Tan Tieniu.An SVD-based watermarking scheme for protecting rightful ownership[].IEEE Transactions on Multimedia.2002
  • 8Seung-Jin Kim,Suk-Hwan Lee,Kwang-Seok Moon,et al.A new digital video watermarking using the dual watermark images and3D DWT[].TENCONIEEE RegionConference.2004
  • 9Rajab L,Al-khatib T,Al-haj A.Hybrid DWT-SVD video watermarking[].Proceedings of International Conference on Innovations in Information Technology.2008
  • 10Zhang Lijing,Li Aihua.A study on video watermark basedon discrete wavelet transform and genetic algorithm[].Proceedings of the st International Workshop on Education Technology and Computer Science.2009

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部