期刊文献+

结合图像归一化与Slant变换的鲁棒图像哈希 被引量:1

Robust image hashing based on image normalization and Slant transform
在线阅读 下载PDF
导出
摘要 为了提高图像哈希算法抵抗几何攻击的性能,提出了一种结合图像归一化和Slant变换的图像哈希算法。使用几何不变矩将原始图像进行归一化操作得到仿射不变图像,仿射不变图像分块并进行Slant变换,根据用户密钥选择Slant变换中频系数极性并生成最终的图像哈希序列。实验结果表明该算法对常见图像操作处理和常见几何攻击鲁棒,对原始图像内容和用户密钥敏感,是一种有效的图像哈希算法。 In order to improve the performance of image hashing algorithm with resistance to geometric distortions, a hashing method based on image normalization and Slant transform is proposed in this paper. The affine invariant image is obtained by using geometric moments invariants with image normalization method. The image is then blocked and Slant transform is applied, and middle-frequency coefficients are obtained. In addition, it further generates the image hashing sequence by using the user-key. Test results indicate that the proposed method is robust to common image procession and geometric distortions, and sensitive to the user-key, so the method proposed in this paper is effective.
作者 陈曦 朱冰
出处 《计算机工程与应用》 CSCD 2013年第23期157-161,共5页 Computer Engineering and Applications
关键词 图像归一化 Slant变换 图像哈希 归一化汉明距离 image normalization Slant transform image hashing normalized Hamming distance
  • 相关文献

参考文献13

  • 1秦川,王朔中,张新鹏.一种基于视觉特性的图像摘要算法[J].中国图象图形学报,2006,11(11):1678-1681. 被引量:17
  • 2Venkatesan R, Koon S M,Jakubowski M H, et al.Robust image hashing[C].IIEEE Conference on Image Processing, Vancouver, Canada,2000: 664-666.
  • 3邹建成,周红丽,邓欢军.一种安全鲁棒的图像哈希方法[J].计算机应用研究,2009,26(6):2122-2124. 被引量:7
  • 4Xiang Shi-jun,Kim Hyoung-joong,HuangJi-wu.Histogram?based image hashing scheme robust against geometric defor?mations[C].IThe 9th ACM Multimedia and Security Work?shop,New York,USA,2007: 121-128.
  • 5Swaminathan A, Mao Y, Wu M.Robust and secure image hashing[J].IEEE Transactions on Information Forensics Secu?rity, 2006, 1(2) : 215-230.
  • 6Kozat S S, Venkatesan R, Mihcak M K.Robust perceptual image hashing via matrix invariants[C].IIEEE Conference on Image Processing, Singapore, 2004: 3443-3446.
  • 7Hu M K.Visual pattern recognition by moment invariants[J]. IEEE Trans on Information Theory, 1962, 8 (2) :179-187.
  • 8Pratt W, Chen W H, Welch L.Slant transform image coding[J]. IEEE Trans on Communicaton, 1974,22(8): 1075-1093.
  • 9段贵多,赵希,李建平,廖建明.一种新颖的用于图像内容认证、定位和恢复的半脆弱数字水印算法研究[J].电子学报,2010,38(4):842-847. 被引量:20
  • 10FridrichJ,Goljan M.Robust hash functions for digital water?marking[C].lProc IEEE Int Conf Information Technology: Coding and Computing, 2000: 178-183.

二级参考文献38

  • 1宋瑞霞,马辉.信号多分辨分析的一类新的正交基[J].科学技术与工程,2005,5(23):1807-1812. 被引量:7
  • 2胡玉平,陈志刚.用于图像认证的小波域半易损水印算法[J].电子学报,2006,34(4):653-657. 被引量:12
  • 3张宪海,杨永田.基于脆弱水印的图像认证算法研究[J].电子学报,2007,35(1):34-39. 被引量:35
  • 4FRIDRICH J, GOLJAN M. Robust hash functions for digital watermarking[ C]//Proc of IEEE Int Conference on Information Technology : Coding and Computing. Washington DC : IEEE Computer Society, 2000 : 178-183.
  • 5LIN C Y, CHANG S F. A robust image authentication system distingushing JPEG compression from malicious manipulation [ J]. IEEE Trans on Circuits Syst for Video Technol,2001,11 (:2) :153-168.
  • 6KIM C. Content-based image copy detection [ J ]. Signal Processing: Image Communication ,2003,18 ( 1 ) : 169-184.
  • 7KAILASANATHAN C, SAFAVI NAINI R, OGUNBONA P. Compression tolerant DCT-based image hash[ C]//Proc of the 23rd International Conference on Distributed Computing Systems Workshops. Washington DC : IEEE Computer Society,2003:562-567.
  • 8LEFEBVRE F, CZYZ J, MACQ B. A robust soft hash algorithm for digital image signature[ C ]//Proc of IEEE International Conference on Image Processing. Spain : [ s. n. ] ,2003:495-498.
  • 9AHMED F,SIYAL M Y. A secure and robust hashing scheme for image authentication [ C ]//Proc of ICICS 2005. 2005:705- 709.
  • 10AHMED F,SIYAL M Y. A novel hashing scheme for image authentication [ J ]. Innovations in Information Technology, 2006,11(1) : 1-5.

共引文献42

同被引文献3

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部