期刊文献+

联合压缩感知和颜色向量角的彩色图像哈希方法 预览 被引量:4

Color Image Hashing with Compressive Sensing and Color Vector Angle
在线阅读 下载PDF
收藏 分享 导出
摘要 提出一种联合压缩感知和颜色向量角的彩色图像哈希方法.该方法先对输入图像进行预处理,并计算其颜色向量角矩阵,然后对矩阵进行非重叠分块,再将每一块进行压缩感知测量,用测量向量的均值构成哈希值.实验表明,该方法对常见数字操作稳健并有良好的唯一性,分类性能优于3种现有方法. This paper presents a hashing method for color images based on compressive sensing and color vector angles. In the preprocessing the input image is first normalized. The normalized image is then converted to a color vector angle matrix, which is further divided into non-overlapping blocks. Compressive sensing is applied to each block, and the mean of measurement vector is used to form the image hash. Experiments show that the proposed method is robust against normal digital operations, has good discrimination capability, and outperforms three existing methods.
作者 刘凯 唐振军 张显全 俞春强 LIU Kai, TANG Zhen-jun, ZHANG Xian-quan, YU Chun-qiang( 1. Guangxi Key Lab of Multi-source Information Mining ~ Security, Guangxi Normal University, Guilin 5~100~, Guangxi Province, China College of Computer Science and Information Technology, Guangxi Normal University, Guilin 5~100~, Guangxi Province, China 3. College of Science, Hunan Agriculture University, Changsha .10128, China)
出处 《应用科学学报》 CAS CSCD 北大核心 2015年第6期595-603,共9页 Journal of Applied Sciences
基金 国家自然科学基金(N0.61562007,No.61300109,No.61363034) 广西自然科学基金(No.2012GXNSFBA053166) 广西高等学校科研项目基金(No.YB2014048) 广西多源信息挖掘与安全重点实验室系统性研究基金(No.1-A-02.02,No.13.A-03-01) 广西高等学校优秀中青年骨干教师培养工程项目基金(No.GxQG012013059)资助
关键词 图像哈希 颜色向量角 压缩感知 测量向量 image hash, color vector angle, compressive sensing, measurement vector
作者简介 通信作者:唐振军,教授,研究方向:图像处理与多媒体信息安全,E-mail:tangzj230@163.tom,zjtang@gxnu.edu.cn
  • 相关文献

参考文献19

  • 1唐振军,王朔中,魏为民,苏胜君.用于图像Hash的视觉相似度客观评价测度[J].中国图象图形学报,2008,13(10):2039-2042. 被引量:3
  • 2Venkatesan R, Koon S, Jakubowski M, Moulin P. Robust image hashing[C]//Proceeding of IEEE International Conference on Image Processing, Vancouver, Canada, 2000:664-666. 被引量:1
  • 3Lefebvre F, Macq B, Legat J D. RASH:Radon soft hash algorithm[C]//Proceeding of European Signal Processing Conference, Toulouse, France, 2002:299-302. 被引量:1
  • 4Ou Y, Rhee K H. A key-dependent secure image hashing scheme by using Radon transform[C]//Proceedings of the IEEE International Symposium on Intelligent Signal Processing and Communication Systems, Kanazawa, Japan, 2009:595-598. 被引量:1
  • 5Kozat S S, Venkatesan R, Mihcak M K. Robust perceptual image hashing via matrix invariants[C]//Proceedings of IEEE International Conference on Image Processing (ICIP'04), Singapore, 2004:3443-3446. 被引量:1
  • 6Monga V, Mihcak M K. Robust and secure image hashing via non-negative matrix factorizations[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3):376-390. 被引量:1
  • 7Tang Z, Zhang X, Zhang S. Robust perceptual image hashing based on ring partition and NMF[J]. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(3):711-724. 被引量:1
  • 8Li Y, Lu Z, Zhu C, Niu X. Robust image hashing based on random Gabor filtering and dithered lattice vector quantization[J]. IEEE Transactions on Image Processing, 2012, 21(4):1963-1980. 被引量:1
  • 9金秋明,王朔中,李茜,张新鹏.基于角点检测的稳健图像摘要[J].中国图象图形学报,2008,13(8):1454-1458. 被引量:2
  • 10Lü X, Wang Z J. Perceptual image hashing based on shape contexts and local feature points[J]. IEEE Transactions onInformation Forensics and Security, 2012, 7(3):1081-1093. 被引量:1

二级参考文献24

  • 1秦川,王朔中,张新鹏.一种基于视觉特性的图像摘要算法[J].中国图象图形学报,2006,11(11):1678-1681. 被引量:15
  • 2Lin C Y, Chang S F. Generating robust digital signature for image/ video authentication [ A ]. In: Proceeding of ACM Multimedia and Security Workshop[ C ] , Bristol, UK, 1998, 243 - 246. 被引量:1
  • 3Lin C Y, Chang S F. A robust image authentication system distinguishing JPEG compression from malicious manipulation [ J ]. IEEE Transactions on Circuits and Systems for Video Technology, 2001, 11(2): 153 - 168. 被引量:1
  • 4Lu C S, Liao H-Y M. Structural digital signature for image authentication [ J ]. IEEE Transactions on Multimedia, 2003 : 5 (2) : 161 - 173. 被引量:1
  • 5Monga V, Evans B L, Perceptual image hashing via feature points: performance evaluation and trade-offs [ J]. IEEE Transactions on Image Processing, 2006, 15( 11 ) :3452 - 3465. 被引量:1
  • 6Monga V, Banerjee A, Evans B L. A clusterlng based approach to perceptual image hashing [ J]. IEEE Transactions on Information Forensics and Security, 2006,1 ( 1 ) : 68 - 79. 被引量:1
  • 7Harris C, Stephens M J. A combined comer and edge detector[ A ]. In:Proceedings of Alvey Vision Conference [ C ], Manchester, UK, 1988 : 147 - 152. 被引量:1
  • 8Schmid C, Mohr R, Bauckhage C. Evaluation of interest point detectors [ J ]. International Journal of Computer Vision, 2000, 37(2) : 151 -172. 被引量:1
  • 9Wang S, Zhang X. Attacks on perceptual image hashing [ A ]. In : Proceedings of 2nd International Conference Technologies & Applications [ C ] , Bail, Indonesia,2007 : 199 - 203. 被引量:1
  • 10Schneider M, Chang S F. A robust content based digital signature for image authentication [ A ]. In: Proceeding of IEEE Conference on Image Processing[ C ], Lausanne, Switzerland , 1996,3:227 - 230. 被引量:1

共引文献3

同被引文献24

  • 1Ahmed F, Siyal M Y, Abbas V U. A secure and robust Hash-based scheme for image authentication[J]. Signal Processing, 2010, 90(5): 1456-1470. 被引量:1
  • 2Monga V, Evans B L. Perceptual image Hashing via feature points: performance evaluation and trade-offs [J]. IEEE Transactions on Image Processing, 2006, 15(11): 3452-3465. 被引量:1
  • 3Sumalatha L, Krishna V V, Kumar V V. Local content based image authentication for tamper localization [J]. International Journal of Image, Graphics and Signal Processing, 2012, 4(9): 30-36. 被引量:1
  • 4Zhao Y, Wang S, Zhang X, Yao H. Robust Hashing for image authentication using Zernike moments and local features [J]. IEEE Transactions on Information Forensics and Security, 2013, 8(1): 55-63. 被引量:1
  • 5Swaminathan A, Mao Y, Wu M. Robust and secure image hashing [J]. IEEE Transactions on Information Forensics Security, 2006, 1(2): 215-230. 被引量:1
  • 6Monga V, Kivanc M. Robust and secure image Hashing via non-negative matrix factorizations[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3): 376-390. 被引量:1
  • 7Tang Z J, Zhang X Q, Zhang S C. Robust perceptual image Hashing based on ring partition and NMF [J]. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(3): 711-724. 被引量:1
  • 8Wang X F, Pang K M, Zhou X R, Zhou Y, Li L, Xue J R. A visual model based perceptual image Hash for content authentication [J]. IEEE Transactions on Information Forensics and Security, 2015, 10(7): 1336-1349. 被引量:1
  • 9Liu K, Tang Z J, Zhang X Q, Yu C Q. Color image Hashing with compressive sensing and color vector angle [J]. Journal of Applied Sciences, 2015, 33(6): 595-603. 被引量:1
  • 10Wang D M, Wang L, Zhang G M. Man-machine function allocation for cockpit based on genetic BP neural network [J]. Journal of Zhejiang University: Engineering Science, 2012, 46(5): 837-841. 被引量:1

引证文献4

二级引证文献7

投稿分析

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部 意见反馈