期刊文献+

Radon变换域的鲁棒图像Hash算法研究

Robust image Hash based on Radon transform
下载PDF
导出
摘要 针对数字图像内容认证的问题,提出了一种基于Radon变换域的鲁棒图像Hash算法。该算法在Radon变换域提取图像平移、缩放不变的矩特征,将矩特征的离散傅里叶变换系数作为图像的Hash值。离散傅里叶变换可实现抗图像旋转操作,并可降低图像Hash的维数。为了增加安全性,整个特征提取过程都是基于密钥进行的。理论分析证明Radon变换域的不变矩特征对一般的图像处理操作,特别是平移、缩放、旋转等几何操作有极好的不变性。实验结果表明提出的算法几乎可以容忍所有的图像内容保存操作,比如缩放、旋转、JPEG压缩、滤波和加噪等,同时对视觉上有明显失真或根本不相似的图像有高度的敏感性。 To solve image content authentication problem,a robust image Hash based on Radon Transform(RT) is presented.RT is performed on the input image,obtaining the invariant moment for translation and scaling,then Discrete Fourier Transform(DFT) is used to resist image rotation operation and reduce dimension of final Hash for image authentication.To enforce security,feature extraction is key-dependent.Experimental results show that the proposed algorithm can tolerate almost all content-preserving operations,such as scaling,rotation,JPEG compression,filtering and adding noises,while being sensitive to distinct distortion and essentially dissimilar image.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第16期191-193,234,共4页 Computer Engineering and Applications
关键词 图像认证 鲁棒图像Hash 不变矩 RADON变换 离散傅里叶变换 image authentication robust image Hash invariant moment Radon transform discrete fourier transform
  • 相关文献

参考文献9

  • 1Monga V,Evans B L.Percoptual image hashing via feature points:performance evaluation and tradeoffs[J].IEEE Transactions on Image Processing,2006,15(11):3452-3465.
  • 2Lin C Y,Chang S F.A robust image authentication method distinguishing JPEG compression from malicious manipulation[J].IEEE Transactions on Circuits and Systems for Video Technology,2001,11 (2):153-168.
  • 3Xiang S J,Kim H J,Huang J W.Histogram-based image hashing scheme robust against geometric deformation[C]//Proc of the 9th ACM Workshop on Multimedia and Security,Texas,USA,2007:121-128.
  • 4秦川,王朔中,张新鹏.一种基于视觉特性的图像摘要算法[J].中国图象图形学报,2006,11(11):1678-1681. 被引量:17
  • 5唐振军,王朔中,魏为民,苏胜君.用于图像Hash的视觉相似度客观评价测度[J].中国图象图形学报,2008,13(10):2039-2042. 被引量:4
  • 6Galigekere R R,Swamy M N S,Fenster A.Moment patterns in the radon space[J].Society of Photo-Optical Instrumentation Engineers,2000,39:1088-1097.
  • 7Hjouj F,Kammler D W.Identification of reflected,scaled,translated,and rotated objects from their radon projections[J].IEEE Transactions on Image Processing,2008,17(3):301-310.
  • 8Jafari-Khouzani K,Soltanian-Zadeh H.Rotation-invariant multiresolution texture analysis using radon and wavelet transforms[J].IEEE Transactions on Image Processing,2005,14(6):783-795.
  • 9Simitopoulos D,Koutsonanos D E,Strintzis M G.Robust image watermarking based on generalized radon transformations[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):732-745.

二级参考文献16

  • 1Swaminathan A,MAO Yi-nian,WU Min.Robust and secure image hashing[J].IEEE Transactions on Information Forensics and Security,2006,1(2):215 ~230.
  • 2Kobayashi H,Kiya H.Robust image authentication using hash function[A].In:Proceedings of IEEE Region 10 Conference on Convergent Technologies[C],Chiang Mai,Thailand,2004,1:435 ~ 438.
  • 3Venkatesan R,Koon S M,Jakubowski M H,et al.Robust image hashing[A].In:Proceedings of International Conference on Image Processing[C],Vancover,BC,Canada,2000,3:664 ~ 666.
  • 4Fridrich J,Goljan M.Robust hash functions for digital watermarking[A].In:Proceedings of International Conference on Information Technology:Coding and Computing[C],Las Vegas,Nevada,USA,2000:173 ~ 178.
  • 5Monga V,Banerjee A,Evans B L.A clustering based approach to perceptual image hashing[J].IEEE Transactions on Information Forensics and Security,2006,1 (1):68 ~ 79.
  • 6Watson A B.DCT quantization matrices optimized for individual images[J].Proceedings of SPIE Human Vision,Visual Processing,and Digital Display Ⅳ,1993,1913:202 ~ 216.
  • 7Venkatesan R, Koon S-M, Jakubowski M H, et al. Robust image hashing [ A ]. In: Proceedings of IEEE International Conference on Image Processing [ C ], Vancouver, Canada, 2000: 664- 666.
  • 8Fridrich J , Goljan M , Robust hash functions for digital watermarking [ A ]. In: Proceedings IEEE International Conference on Information Technology: Coding and Computing [ C ] , Las Vergas, NA, USA, 2000:178 - 183.
  • 9Lin C Y, Chang S F. A robust image authentication system distinguishing JPEG compression from malicious manipulation [ J ]. IEEE Transactions on Circuits System and Video Technology, 2001, 11(2) : 153 - 168.
  • 10Lefebvre F , Macq B , Legat J D. RASH : Radon soft hash algorithm [ A ]. In: Proceedings of European Signal Processing Conference [ C ] , Toulouse, France, 2002:299 - 302.

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部