期刊文献+

基于约束随机分块的NMF图像哈希算法 被引量:6

NMF-Based Image Hashing Algorithm Using Restricted Random Blocking
在线阅读 下载PDF
导出
摘要 基于非负矩阵分解(Non-negative Matrix Factorization,NMF)的图像哈希(image hashing)算法对图像有损压缩,低通滤波、尺度拉伸等处理具有很好的稳健性,但对图像旋转比较敏感。为此,该文在对NMF哈希算法的分块模式进行深入研究的基础上,提出一种可抗旋转攻击的NMF图像哈希算法。该方法通过对随机分块的区域进行限制,并选择合适的分块尺寸来减轻旋转攻击对图像造成的不良影响,从而提高了特征的旋转稳健性。实验表明,所提出的图像哈希算法在保持原NMF哈希算法对其它攻击稳健性的同时,能有效地抵抗旋转攻击。 The NMF(Non-negative Matrix Factorization)-based image hashing is robust to common image operations(such as lossy compression,low-pass filtering,resolution scaling and etc.),but is sensitive to rotation operations.After carefully investigating the blocking strategy of the original NMF-based scheme,a rotation-resilient image hashing algorithm is proposed.The proposed algorithm reduces the undesirable effect induced by image rotation through constraining blocking range and adopting appropriate block size,and thus provides better robustness to image rotation.Experimental results demonstrate that the proposed hashing algorithm provides a satisfactory robustness to image rotation while keeping its performance to common image processing operations.
出处 《电子与信息学报》 EI CSCD 北大核心 2011年第2期337-341,共5页 Journal of Electronics & Information Technology
基金 国家自然科学青年基金(60903177) 中央高校基本科研业务费专项资金(21609412) 博士点新教师基金(200805581048) 中国青年科学基金(61003297)资助课题
关键词 图像处理 图像哈希 非负矩阵分解 稳健性 旋转 Image processing Image hashing Non-negative Matrix Factorization(NMF) Robustness Rotation
  • 相关文献

参考文献12

  • 1Lin C Y and Chang S F. A robust image authentication system distinguishing JPEG compression from malicious manipulation [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2001, 11(2): 153-168.
  • 2Venkatesan R, Koon S M, Jakubowski M H, and Moulin P. Robust image hashing[C]. IEEE Conference on Image Processing, Vancouver, Canada. September 2000: 664-666.
  • 3张维克,孔祥维,尤新刚.安全鲁棒的图像感知哈希技术[J].东南大学学报(自然科学版),2007,37(A01):188-192. 被引量:18
  • 4秦川,王朔中,张新鹏.一种基于视觉特性的图像摘要算法[J].中国图象图形学报,2006,11(11):1678-1681. 被引量:17
  • 5邹建成,周红丽,邓欢军.一种安全鲁棒的图像哈希方法[J].计算机应用研究,2009,26(6):2122-2124. 被引量:7
  • 6王阿川,陈海涛.基于离散余弦变换的鲁棒感知图像哈希技术[J].中国安全科学学报,2009,19(4):91-96. 被引量:9
  • 7Xiang Shi-jun, Kim Hyoung-joong, and Huang Ji-wu, Histogram-based image hashing scheme robust against geometric deformations [C]. The 9th ACM Multimedia and Security Workshop, New York, USA. September 2007: 121-128.
  • 8Swaminathan A, Mao Y, and Wu M. Robust and secure image hashing [J]. IEEE Transactions on Information Forensics Security, 2006, 1(2): 215-230.
  • 9Kozat S S, Venkatesan R, and Mihcak M K. Robust perceptual image hashing via matrix invariants [C]. IEEE Conference on Image Processing, Singapore, 2004: 3443-3446.
  • 10Lee D D and Seung H S. Algorithms for non-negative matrix factorization [C]. Neural Information Processing Systems 13, Cambridge, MA: MIT Press, 2000: 556-562.

二级参考文献39

  • 1卞国春,张曦煌.基于DCT压缩的JPEG图像的快速检索[J].计算机应用,2005,25(7):1623-1625. 被引量:9
  • 2宋瑞霞,马辉.信号多分辨分析的一类新的正交基[J].科学技术与工程,2005,5(23):1807-1812. 被引量:7
  • 3FRIDRICH J, GOLJAN M. Robust hash functions for digital watermarking[ C]//Proc of IEEE Int Conference on Information Technology : Coding and Computing. Washington DC : IEEE Computer Society, 2000 : 178-183.
  • 4LIN C Y, CHANG S F. A robust image authentication system distingushing JPEG compression from malicious manipulation [ J]. IEEE Trans on Circuits Syst for Video Technol,2001,11 (:2) :153-168.
  • 5KIM C. Content-based image copy detection [ J ]. Signal Processing: Image Communication ,2003,18 ( 1 ) : 169-184.
  • 6KAILASANATHAN C, SAFAVI NAINI R, OGUNBONA P. Compression tolerant DCT-based image hash[ C]//Proc of the 23rd International Conference on Distributed Computing Systems Workshops. Washington DC : IEEE Computer Society,2003:562-567.
  • 7LEFEBVRE F, CZYZ J, MACQ B. A robust soft hash algorithm for digital image signature[ C ]//Proc of IEEE International Conference on Image Processing. Spain : [ s. n. ] ,2003:495-498.
  • 8AHMED F,SIYAL M Y. A secure and robust hashing scheme for image authentication [ C ]//Proc of ICICS 2005. 2005:705- 709.
  • 9AHMED F,SIYAL M Y. A novel hashing scheme for image authentication [ J ]. Innovations in Information Technology, 2006,11(1) : 1-5.
  • 10AHMED F, SIYAL M Y. A secure and robust DCT-based hashing scheme for image authentication[ C]//Proc of the 10th IEEE Singapore International Conference on Communication Systems. 2006:1-6.

共引文献59

同被引文献51

  • 1秦川,王朔中,张新鹏.一种基于视觉特性的图像摘要算法[J].中国图象图形学报,2006,11(11):1678-1681. 被引量:17
  • 2王朔中,张新鹏.Recent development of perceptual image hashing[J].Journal of Shanghai University(English Edition),2007,11(4):323-331. 被引量:7
  • 3MAO S Y, WU M. Robust and secure image hashing[ J]. IEEE Transactions on Information Forensics and Security, 2006, 1 (2) : 215-230.
  • 4MONGA V, BANERJEE A, EVANS B L. A clustering based approach to perceptual image hashing[J]. IEEE Transactions on Information Forensics and Security, 2006, 1 ( 1 ) : 65-79.
  • 5COSKUN B, SANKUR B, MEMON N. Spatio-temporal transform based video hashing[J]. IEEE Transactions on Multimedia, 2006, 8(6) : 1190-1208.
  • 6JIN M, YOO C D. Quantum Hashing for multimedia[ J ]. IEEE Transactions on Information Forensics and Security, 2009, 4(4) : 982-994.
  • 7JIAO Yuhua, JI Liping, NIU Xiamu. Robust speech hashing for content authentication[J]. IEEE Signal Processing Letters, 2009, 16(9) : 818-821.
  • 8LEI Yanqiang, WANG Yuangen, HUANG Jiwu. Robustimage hash in radon transform domain for authentication [ J ]. Signal Processing : Image Communication, 2011, 26(6) : 280-288.
  • 9LI Weng, BART P. A novel video Hash algorithm[ C]// 18th ACM International Conference on Multimedia ACM Multimedia 2010-MM'10. New York: Association for Computing Machinery, 2010: 739-742.
  • 10NIE Xiushan, LIU Ju, SUN Jiande, et al. Robust video Hashing based on double-layer embedding[J]. IEEE Signal Processing Letters, 2011, 18(5): 307- 310.

引证文献6

二级引证文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部