期刊文献+

基于提升小波变换和BP神经网络的图像哈希算法 被引量:1

Image hashing algorithm based on lifting wavelet transform and BP neural network
下载PDF
导出
摘要 针对数字图像作为一种常用的数字多媒体信息,对其真实性和完整性的认证显得尤其重要,提出了一种基于提升小波变化和BP神经网络的图像哈希算法。首先利用图像像素矩阵和构造的函数来训练BP神经网络;再将图像进行提升小波变换,利用低频分量组成矩阵;最后利用已经训练好的BP神经网络来产生哈希序列。实验结果表明,本算法不仅可以抵抗内容保持的修改操作,而且能够很好地区分恶意攻击,有一定的鲁棒性和脆弱性。该技术在图像认证、版权保护、安全和基于内容的图像检索等方面有应用价值。 As a useful digital multimedia information,authenticating the authenticity and the integrity of digital image is especially important. This paper presented an image hashing algorithm based on lifting wavelet transform and BP neural network. Firstly,used the image pixel matrix and the constructed function to train the BP neural network,and then the low-frequency components obtained by the lifting wavelet transform composed the matrix. At last,generated the image hash sequence by the well-trained BP neural network. The experimental results show that the proposed scheme not only can resist the content-preserving modifications,but also it is sensitive to the image of malicious tampering,so it is robust and fragile. Therefore,the method could be used to image authentication,copyright protection,image security and content-based image retrieval and so on.
出处 《计算机应用研究》 CSCD 北大核心 2010年第10期3974-3976,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60702065) 湘潭市科技计划重点项目资助课题(ZJ20071008)
关键词 图像哈希 提升小波变换 神经网络 图像认证 image hash lifting wavelet transform neural network image authentication
  • 相关文献

参考文献6

  • 1MONGA V, BANERJEE A, EVANS B L. A clustering based approach to perceptual image hashing[ J]. IEEE Trans on Information Forensics and Security,2006,1 ( 1 ) :68-79.
  • 2MONGA .V, MIHCAK M K. Robust and secure image hashing via non-negative matrix factorizations[ J]. IEEE Trans on Information Forensics and Security,2007,2(3 ) :376-390.
  • 3VENKATESAN R, KOON S-M, JAKUBOWSKI M H, et al. Robust image hashing [ C ]//Proc of IEEE International Conference on Image Processing. Vancouver: IEEE,2000 : 664- 666.
  • 4FRIDRICH J, GOLJAN M. Robust hash functions for digital watermarking[ C]//Proc of International Conference on Information Technology : Coding and Computing. Washington DC : IEEE Computer Society,2000 : 178-183.
  • 5MIHCAK M K, VENKATESAN R. New iterative geometric methods for robust perceptual image hashing[ C]//Proc of ACM Workshop on Security and Privacy in Dig. Rights Mgmt. London: Springer-Verlag, 2001 : 13-21.
  • 6WANG Hong, SUN Qiong. Research on audio information hiding algorithm based on BP neural network[ C]//Proc of International Conference On Wavelet Analysis and Pattern Recognition. [ S. l. ] : 1EEE, 2007 : 687 - 690.

同被引文献1

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部