期刊文献+

基于图像正则化和DCT变换的感知哈希技术

Perceptual Hashing Algorithm Based on Image Normalization and DCT Transform
下载PDF
导出
摘要 图像感知哈希技术是一门较新型的技术,哈希提取过程的关键步骤是特征提取,传统的基于DCT变换的感知哈希技术抗几何攻击能力较差。试图在图像生成哈希之前,将几何形变对图像的影响去除,首先将图像进行正则化,使图像具有几何不变性,然后再进行DCT特征系数提取,最后通过量化、编码生成最终哈希。该算法可以抵抗任意的仿射变换。 The technique of perceptual hashing is a new technology relatively,and the feature extraction is the most important step in the extraction process,the traditional and DCT-based hashing technique is less able to resist the geometric attacks. This paper attempts to remove the influence of geometric effects on image before generating the image hash.First,normal- ize the image to make it invariant to any affine transforms,then extract the feature coefficient through DCT transformation, and finally generate the final hash through quantization and encoding.The algorithm can resist any affine transformations.
出处 《工业控制计算机》 2014年第3期52-53,共2页 Industrial Control Computer
关键词 图像感知哈希 图像正则化 DCT变换 image perceptual hashing,image normalization,DCT transform
  • 相关文献

参考文献6

  • 1Han Shuihua,Chu Chao-hsien,Yang Shuangyuan.Content- based image authentication:current status issues,and chal- lenges [C].ICSC 2007 International Confrence on Semantic Computing,2007:630-636.
  • 2A.Hadmi,et al.,A robust and secure perceptual hashing sys- tem based on a quantization step analysis,Signal Process- ing-Image Communication (2013),http://dx.doi.org/10.1016/j. image.2012.11.009.
  • 3MONGA V,MHCAK M K.Robuts and secure image hashing via non-negative matrix factorizations [J].IEEE Transactions on Information Forensics and Security,2007,2(3):376-390.
  • 4王阿川,陈海涛.基于离散余弦变换的鲁棒感知图像哈希技术[J].中国安全科学学报,2009,19(4):91-96. 被引量:9
  • 5孙锐,闫晓星,丁志中.基于图像正则化的抗几何变换的感知哈希算法[J].工程图学学报,2010,31(2):116-122. 被引量:4
  • 6Monga V,Banerjee A,Evans B L.A clustering based approach to percepture image hashing [J].IEEE Transactions on Infor- mation Forensics and Security,2006,1 (1) :68-79.

二级参考文献12

  • 1卞国春,张曦煌.基于DCT压缩的JPEG图像的快速检索[J].计算机应用,2005,25(7):1623-1625. 被引量:9
  • 2V enkatesan R, Koon S M, Jakubow ski M H. Robust image hashing[A]. Proc. IEEE Conf. on Image Processing[C].Vancouver, BC, Canada,2000:664 - 666
  • 3Mihcak K, Venkatesan R. New Iterative Geometric Methods for Robust Perceptual Image Hashing [M].New York: Springer Berlin Heidelberg ,2002 : 13 - 21
  • 4C Y Lin, S F Chang. A robust image authentication method distinguishing JPEG compression from malicious manipulation [J]. Circuits and Systems for Video Technology ,2001,4(2) : 153 - 168
  • 5S S Kozat, K Mihcak, R Venkatesan. Robust perceptual image hashing via matrix invariants [ A]. Proc. IEEE Conf. on Image Processing[ C]. USA,2004:3 443 - 3 446
  • 6Sebe N, Tian Q, Loupias E. Color Indexing Using Wavelet-based Salient Points[A]. Proceedings of IEEE Workshop on Content-based Access of Image and Video Libraries[C]. Hilton Head Island,South Carolina,2000:15 - 19
  • 7王丽娜,郭迟,李鹏.信息隐藏技术[M].武汉:武汉大学出版社,2004.10
  • 8王朔中,张新鹏.Recent development of perceptual image hashing[J].Journal of Shanghai University(English Edition),2007,11(4):323-331. 被引量:7
  • 9张维克,孔祥维,尤新刚.安全鲁棒的图像感知哈希技术[J].东南大学学报(自然科学版),2007,37(A01):188-192. 被引量:18
  • 10牛夏牧,焦玉华.感知哈希综述[J].电子学报,2008,36(7):1405-1411. 被引量:98

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部