期刊文献+

结合保角变换和Zernike矩的稳健图像Hash 被引量:8

Perpetual Image Hashing Based on Conformal Mapping and Zernike Moments
下载PDF
导出
摘要 提出一种用于图像认证和篡改检测的稳健图像Hash方法.根据密钥对图像进行伪随机分块,将图像块规格化为大小相等的正方形并进行保角变换,使各图像块映射为单位圆.对各圆形图像区域计算修正的Zernike矩,连接所有Zernike矩的幅度和相位,基于密钥置乱得到所要求的图像Hash.与直接对正方形内切圆计算Zernike矩的方法相比,保角变换使图像块四角纳入Hash所表征的图像内容,因而有效改进了篡改检测性能.图像分块使Hash具备篡改定位的能力.实验表明该方法具有很低的碰撞概率和良好的感知稳健性,与其他方法相比,碰撞率和检错率较低. We propose a perpetual image hashing method applicable to image authentication and tamper detection.The input image is pseudo-randomly partitioned into blocks,which are resized to become squares of a standard size and mapped to a unit circle by conformal mapping.Zernike moments of the circular-shaped "images" are calculated,and then modified by multiplying an exponent to achieve phase rotation-invariance. All amplitudes and phases of the modified Zernike moments are concatenated to form an intermediate Hash sequence.The final Hash is produced by pseudo-randomly permuting the intermediate Hash.The purpose of conformal mapping is to include information contained in the corners of square image blocks into the extracted image Hash so that the tamper detection capability is significantly enhanced.Experimental results show that the proposed method is robust against most content-preserving image processing operations.Image blocking allows the tampered regions in the image to be correctly located.Compared to some other techniques,the method has low probabilities of collision and less error in tamper detection.
出处 《应用科学学报》 EI CAS CSCD 北大核心 2012年第1期75-81,共7页 Journal of Applied Sciences
基金 国家自然科学基金(No.60773079 No.60872116 No.60832010)资助
关键词 图像HASH 保角变换 ZERNIKE矩 图像认证 篡改检测 image Hash conformal mapping Zernike moments image authentication tampering detection
  • 相关文献

参考文献15

  • 1Norgaard JP, van Gool JD, Hjalmas K, et al.Standardization and definitions in lower urinary tract dysfunction in children. International Children's Continence Society. Br J Urol, 1998,81(Suppl 3): 1
  • 2Gearhart JP, Rink RC,Mouriquand PE. Pediatric urology.Philadelphia:WB Saunders Company,2001. 497
  • 3Koff SA.Non-neuropathic vesicourethral dysfunction in children.In: Pediatric urology. 3rd ed.O'Donnell B, Koff SA. Pennsylvania:Butterworth-Heinemann, 1997.217
  • 4KHELIFI F, JIANG J. Analysis of the security of per- ceptual image hashing based on non-negative ma- trix factorization [J]. IEEE Signal Processing Letters, 2010, 17(1): 43-46.
  • 5李杰,陈春云,丁钰,黄士坤,张青.6~16岁儿童遗尿症流行病学调查[J].中国全科医学,2003,6(10):846-847. 被引量:17
  • 6Kanaheswari Y. Epidemiology of childhood nocturnal enuresis in Malaysia.J Paediatr Child Health,2003,39(2):118
  • 7Yeung CK, Sit FKY, To LKC, et al. Primary nocturnal enuresis in Hong Kong schoolchildren: a critical reappraisal from a large epidemiological study. Br J Urol, 2001, 87(Suppl 1) : 47
  • 8Cher TW, Lin GJ, Hsu KH. Prevalence of nocturnal enuresis and associated familial factors in primary school children in taiwan.J Urol, 2002,168(3):1 142
  • 9Chang P, Chen WJ, Tsai WY, et al. An epidemiological study of nocturnal enuresis in Taiwan Residents children.BJU Int,2001,87(7):678
  • 10Yeung CK. Nocturnal enuresis in Hong Kong: different Chinese phenotypes. Scand J Urol Nephrol Suppl, 1997,183:17

二级参考文献17

  • 1罗学荣,万国斌,苏林雁,杨志伟,李雪荣.湖南省4~16岁儿童功能性遗尿的流行病学调查[J].湖南医科大学学报,1995,20(3):223-226. 被引量:23
  • 2GOPALAKRISHNAN V, HU Y, RAJAN D. Salient region detection by modeling distributions of color and orientation[J]. IEEE Transactions on Multimedia, 2009, 11(5): 892-905.
  • 3BUSCHMAN T J, MILLER E K. Top-down versus bottom-up control of attention in the prefrontal and posterior parietal cortices[J]. Science, 2007, 315(5820): 1860-1862.
  • 4ITTI L, KOCH C, NIEBUR E. A model of saliency-based visual attention for rapid scene analysis[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1998, 20(11): 1254-1259.
  • 5ITTI L, KOCH C. A saliency-based search mechanism for overt and covert shifts of visual attention[J]. Vision Research, 2000, 40(10): 1489-1506.
  • 6ITTI L, KOCH C, NIEBUR E. Computation modeling of visual attention[J]. Nature Reviews. Neuroscience, 2001, 2(11): 194-203.
  • 7WALTHER D, ITTI L, RIESENHUBER M, POGGIO T, KOCH C. Attentional selection for object recognition - a gentle way[J]. Lecture Notes in Computer Science, 2002, 2525(1): 472-479.
  • 8WALTHER D, ITTI L, KOCH C. Saliency Toolbox. http://www.saliencytoolbox.net, 2008.11.
  • 9WEIJER J, GEVERS T, BAGDANOV A D. Boosting color saliency in image feature detection[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2006, 28(1): 150-156.
  • 10LI Qian, WANG Shuozhong, ZHANG Xinpeng. Hierarchical identification of visually salient image regions[C]// Audio Language and Image Processing, ICALIP 2008 International Conference, Shanghai, China, July 7-9, 2008: 1708-1712.

共引文献22

同被引文献27

引证文献8

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部