期刊文献+

多特征视觉Hash方案

Perceptual image hash scheme based on multiple features
下载PDF
导出
摘要 提出一种基于认证安全性的视觉Hash设计方案。通过对视觉Hash认证中鲁棒性、认证集合相互关系的分析,指出了采用多特征构造视觉Hash的必要性。多特征方法可以平衡视觉Hash认证中的虚警、漏警问题。设计了一种基于小波分解的视觉Hash算法。对多次分解的小波低频系数进行量化提取多重特征,利用精确Hash算法组合生成认证Hash。实验结果表明本方案对JPEG压缩、滤波、噪声等处理有良好的鲁棒性,且具有较好的认证安全性,可以用于图像的真实性认证。 A perceptual image hashing scheme based on authentication security is proposed. The security analysis proves that multiple features are necessary in perceptual image Hash scheme. The false negative probability and false positive probability can be balanced in authentication by using multiple features. A novel perceptual image hash algorithm is designed based on wavelet transform. Multiple features are extracted and quantized after multiple wavelet segmentations. Then the precise Hash algorithm is used to generate authentication Hash. Experimental results show that the proposed scheme is robust a gainst JPEG compression,filtering,noise and some else managements, It can satisfy the multimedia content authentication.
出处 《光电子.激光》 EI CAS CSCD 北大核心 2008年第11期1516-1520,共5页 Journal of Optoelectronics·Laser
基金 国家自然科学基金资助项目(60374066 60574082) 江苏省自然科学基金资助项目(BK2004132) 中国信息安全产品评测认证中心"115"基金资助项目 江苏省"青蓝工程"中青年学术带头人培养基金资助项目
关键词 视觉Hash 认证安全性 多特征 小波变换 perceptual hash security of authentication multiple features wavelet transform
  • 相关文献

参考文献13

  • 1Vanstone S A, Menezes A J, Oorschot P C. Handbook of applied cryptography(New York: CRC Press), 1996.
  • 2Fridrich J, Goljan M, Robot hash functions for digital watermarking [C]. IEEE Proceedings International Conference on Information Technology:Coding and Computing,2000.178-183.
  • 3Venkatesan R,Kon S M, Jakubowski M H,et al. New iterative geometric technique for robust image hashing[C]. IEEE International Conference on Image Processing, 2000,3: 664-666.
  • 4Mihcak K,Venkatesan R,New iterative geometric technique for robust image hashing[C]. Proceedings of ACM workshop on security and privacy in digital rights management, 2001, 13-21.
  • 5Lefebvre F, Macq B, Legat J D, RASH;Radon Soft Hash algorithm[C]. In the proceedings of European Signal Processing Conference, 2002, Toulouse.
  • 6Lefebvre F,Cqvz J,Macq B,A robust soft hash algoritlTn for digital image signature[C]. IEEE International Conference on image Processing,2003,3:Ⅱ495-8.
  • 7Monga V, Evans B L, Perceptual image hashing via feature points: performance evaluation and trade-offs[J]. IEEE Transactions on Image Processing,2006,15(11) :3453-3466.
  • 8Monga V,Mihcak M K,Robust image hashing via non-negative matrix factorizations [C]. IEEE International Conference on Acoustics, Speech,and Signal Processing,2006.11-225-228.
  • 9Swaminathan A, Mao Y, Wu M. Robust and secure image hashing [J]. IEEE Transactions On Information Forensics and Security, 2006,1 (2):215-230.
  • 10Mao Y, Wu M, Unicity distance of robust image hashing[J]. IEEE Transactions on information forensics and security, 2007,2 (3): 462- 467.

二级参考文献25

共引文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部