期刊文献+

联合压缩感知和颜色向量角的彩色图像哈希方法 被引量:4

Color Image Hashing with Compressive Sensing and Color Vector Angle
下载PDF
导出
摘要 提出一种联合压缩感知和颜色向量角的彩色图像哈希方法.该方法先对输入图像进行预处理,并计算其颜色向量角矩阵,然后对矩阵进行非重叠分块,再将每一块进行压缩感知测量,用测量向量的均值构成哈希值.实验表明,该方法对常见数字操作稳健并有良好的唯一性,分类性能优于3种现有方法. This paper presents a hashing method for color images based on compressive sensing and color vector angles. In the preprocessing the input image is first normalized. The normalized image is then converted to a color vector angle matrix, which is further divided into non-overlapping blocks. Compressive sensing is applied to each block, and the mean of measurement vector is used to form the image hash. Experiments show that the proposed method is robust against normal digital operations, has good discrimination capability, and outperforms three existing methods.
出处 《应用科学学报》 CAS CSCD 北大核心 2015年第6期595-603,共9页 Journal of Applied Sciences
基金 国家自然科学基金(No.61562007 No.61300109 No.61363034) 广西自然科学基金(No.2012GXNSFBA053166) 广西高等学校科研项目基金(No.YB2014048) 广西多源信息挖掘与安全重点实验室系统性研究基金(No.14-A-02-02 No.13-A-03-01) 广西高等学校优秀中青年骨干教师培养工程项目基金(No.GXQG012013059)资助
关键词 图像哈希 颜色向量角 压缩感知 测量向量 image hash, color vector angle, compressive sensing, measurement vector
  • 相关文献

参考文献19

  • 1唐振军,王朔中,魏为民,苏胜君.用于图像Hash的视觉相似度客观评价测度[J].中国图象图形学报,2008,13(10):2039-2042. 被引量:4
  • 2Venkatesan R, Koon S, Jakubowski M, Moulin P. Robust image hashing[C]//Proceeding of IEEE International Conference on Image Processing, Vancouver, Canada, 2000:664-666.
  • 3Lefebvre F, Macq B, Legat J D. RASH:Radon soft hash algorithm[C]//Proceeding of European Signal Processing Conference, Toulouse, France, 2002:299-302.
  • 4Ou Y, Rhee K H. A key-dependent secure image hashing scheme by using Radon transform[C]//Proceedings of the IEEE International Symposium on Intelligent Signal Processing and Communication Systems, Kanazawa, Japan, 2009:595-598.
  • 5Kozat S S, Venkatesan R, Mihcak M K. Robust perceptual image hashing via matrix invariants[C]//Proceedings of IEEE International Conference on Image Processing (ICIP'04), Singapore, 2004:3443-3446.
  • 6Monga V, Mihcak M K. Robust and secure image hashing via non-negative matrix factorizations[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3):376-390.
  • 7Tang Z, Zhang X, Zhang S. Robust perceptual image hashing based on ring partition and NMF[J]. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(3):711-724.
  • 8Li Y, Lu Z, Zhu C, Niu X. Robust image hashing based on random Gabor filtering and dithered lattice vector quantization[J]. IEEE Transactions on Image Processing, 2012, 21(4):1963-1980.
  • 9金秋明,王朔中,李茜,张新鹏.基于角点检测的稳健图像摘要[J].中国图象图形学报,2008,13(8):1454-1458. 被引量:2
  • 10Lü X, Wang Z J. Perceptual image hashing based on shape contexts and local feature points[J]. IEEE Transactions onInformation Forensics and Security, 2012, 7(3):1081-1093.

二级参考文献24

  • 1秦川,王朔中,张新鹏.一种基于视觉特性的图像摘要算法[J].中国图象图形学报,2006,11(11):1678-1681. 被引量:17
  • 2Lin C Y, Chang S F. Generating robust digital signature for image/ video authentication [ A ]. In: Proceeding of ACM Multimedia and Security Workshop[ C ] , Bristol, UK, 1998, 243 - 246.
  • 3Lin C Y, Chang S F. A robust image authentication system distinguishing JPEG compression from malicious manipulation [ J ]. IEEE Transactions on Circuits and Systems for Video Technology, 2001, 11(2): 153 - 168.
  • 4Lu C S, Liao H-Y M. Structural digital signature for image authentication [ J ]. IEEE Transactions on Multimedia, 2003 : 5 (2) : 161 - 173.
  • 5Monga V, Evans B L, Perceptual image hashing via feature points: performance evaluation and trade-offs [ J]. IEEE Transactions on Image Processing, 2006, 15( 11 ) :3452 - 3465.
  • 6Monga V, Banerjee A, Evans B L. A clusterlng based approach to perceptual image hashing [ J]. IEEE Transactions on Information Forensics and Security, 2006,1 ( 1 ) : 68 - 79.
  • 7Harris C, Stephens M J. A combined comer and edge detector[ A ]. In:Proceedings of Alvey Vision Conference [ C ], Manchester, UK, 1988 : 147 - 152.
  • 8Schmid C, Mohr R, Bauckhage C. Evaluation of interest point detectors [ J ]. International Journal of Computer Vision, 2000, 37(2) : 151 -172.
  • 9Wang S, Zhang X. Attacks on perceptual image hashing [ A ]. In : Proceedings of 2nd International Conference Technologies & Applications [ C ] , Bail, Indonesia,2007 : 199 - 203.
  • 10Schneider M, Chang S F. A robust content based digital signature for image authentication [ A ]. In: Proceeding of IEEE Conference on Image Processing[ C ], Lausanne, Switzerland , 1996,3:227 - 230.

共引文献4

同被引文献14

引证文献4

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部