期刊文献+

一种基于混沌的图像hash算法 被引量:3

Image hash algorithm based on chaos theory
下载PDF
导出
摘要 为了实现图像认证,提出了基于混沌理论的图像hash算法。首先将原始图像经过置乱得到加密图像,然后对差值矩阵进行调制、量化,得到固定长度的图像hash序列。算法讨论了图像的缩放和JPEG压缩对图像hash序列的影响,当阈值为0.1时,对上述的攻击方法进行了实验,结果表明,图像对这两种攻击具有一定的鲁棒性。 To meet the needs of the Image Authentication,proposed image hash algorithm based on chaos theory.To begin with,encrypted the original image by Logistic map.After that,difference matrix was modulated and quantified,and then obtained the fixed length of hash sequence.It discussed that the image scaling and JPEG compression were influence on the robustness of the hash sequence.It pointed that robust of the proposed scheme against the above attacks when the threshold t is 0.1.The experimental results indicate that the algorithm has the robust to against the above attacks,then the method is an effective for studying image authentication.
出处 《计算机应用研究》 CSCD 北大核心 2011年第5期1904-1905,1925,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60873201) 重庆市自然科学基金资助项目(2009BB2211)
关键词 Logistics映射 混沌系统 鲁棒性 图像HASH 标准汉明距离 Logistics map chaos system robust image hash normalized Hamming distance
  • 相关文献

参考文献8

  • 1秦川,王朔中,张新鹏.一种基于视觉特性的图像摘要算法[J].中国图象图形学报,2006,11(11):1678-1681. 被引量:17
  • 2MONGA V, EVANS B L. Perceptual image hashing via feature points : performance evaluation and tradeoffs [ J ]. IEEE Trans on Image Processing ,2006,15 ( 11 ) :3453-3466.
  • 3SCHEIDER M,CHANG S F. A robust content based digital signature for image authentication [ C ]//Proc of IEEE International Conference on Image Processing. 1996:227-230.
  • 4KAILASANATHAN C,NAINI R S. Image authentication surviving acceptable modifications using statistical measures and K-mean segmentation [ C ]//Proc of IEEE-EURAS IP Work Nonlinear Signal and Image. 2001.
  • 5FRIDRICH J, GOLIAN M. Robust hash functions for digital water-marking[ C]//Proc of IEEE International Conference on Information Technology: Coding Computing. Washington DC: IEEE Computer Society, 2000 : 178-183.
  • 6DITFMAN J, STEINMETZ A, STEINMETZ R. Content based digital signature for motion pictures authentication and content fragile water-marking[C]//Proc of IEEE International Conference on Multimedia Computing and System. Washington DC: IEEE Computer Society, 1999,209-213.
  • 7LIN C Y, CHANG S F. A robust image authentication system distinguishing JPEG compression from malicious manipulation [ J ]. IEEE Trans on Circuits and Systems for Video Technology, 2001,11 (2) :153-168.
  • 8邓绍江,张岱固,濮忠良.一种基于混沌的图像置乱算法[J].计算机科学,2008,35(8):238-240. 被引量:21

二级参考文献16

  • 1刘向东,焉德军,朱志良,王光兴.基于排序变换的混沌图像置乱算法[J].中国图象图形学报(A辑),2005,10(5):656-660. 被引量:35
  • 2Swaminathan A,MAO Yi-nian,WU Min.Robust and secure image hashing[J].IEEE Transactions on Information Forensics and Security,2006,1(2):215 ~230.
  • 3Kobayashi H,Kiya H.Robust image authentication using hash function[A].In:Proceedings of IEEE Region 10 Conference on Convergent Technologies[C],Chiang Mai,Thailand,2004,1:435 ~ 438.
  • 4Venkatesan R,Koon S M,Jakubowski M H,et al.Robust image hashing[A].In:Proceedings of International Conference on Image Processing[C],Vancover,BC,Canada,2000,3:664 ~ 666.
  • 5Fridrich J,Goljan M.Robust hash functions for digital watermarking[A].In:Proceedings of International Conference on Information Technology:Coding and Computing[C],Las Vegas,Nevada,USA,2000:173 ~ 178.
  • 6Monga V,Banerjee A,Evans B L.A clustering based approach to perceptual image hashing[J].IEEE Transactions on Information Forensics and Security,2006,1 (1):68 ~ 79.
  • 7Watson A B.DCT quantization matrices optimized for individual images[J].Proceedings of SPIE Human Vision,Visual Processing,and Digital Display Ⅳ,1993,1913:202 ~ 216.
  • 8Wu M, Liu B. Data hiding in image and video: Part I-Fundamental issues and solutions [J]. IEEE Trans On Image Processing, 2003,12(6) : 685-694.
  • 9Dachselt F, Schwarz W. Chaos and Cryptography[J]. IEEE Trans Circuits Syst I,2001, 48(12):1498-1509.
  • 10Li Shujun, Mou Xuanqin, Cai Yuanlong. Improving security of a chaotic encryption approach[J]. Physics Letters A, 2001, 290 (11):127-133.

共引文献35

同被引文献26

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部