期刊文献+

一种基于分块压缩感知的鲁棒图像散列算法 被引量:1

Robust Image Hashing Based on Block Compressed Sensing
下载PDF
导出
摘要 图像散列算法是一种把数字图像映射为一个基于内容的简短二进制比特串的技术,它具有鲁棒性、安全性、紧凑性和单向性等特点,已被广泛应用于图像鉴别与图像识别领域中。本文提出一种基于分块压缩感知的鲁棒图像散列算法,其设计利用了压缩感知采样阶段的计算保密及线性运算的特点。该算法通过对图像进行分块,利用压缩感知理论在密钥的控制下将图像块随机投影为一个测量值向量序列,并把每个测量值向量量化为一个比特,得到一个长度可由分块策略调整的二进制散列值。实验结果表明,本文算法在鲁棒性、安全性和运算速度等方面具有良好的性能。 Image hashing is a technique to map a digital image into a content-based and short binary code.It has the properties of robustness,security,compactness and one-wayness,which has been widely applied in the field of image authentication and identification.Here,a robust image hashing algorithm based on block compressed sensing is proposed,using the characteristics of secure computation and linear operation in the sampling stage.In the proposed algorithm,the input image is partitioned into sub-blocks.For each sub-block,random projection is applied to it based on the theory of compressed sensing,and a measurement vector can be obtained under the control of the secret key.Then each measurement vector is quantized as one bit and finally a binary hash value can be obtained whose length can be adjusted by the strategy of image partition.Experimental results show that the proposed algorithm has satisfied performance in robustness,security and speed.
出处 《数据采集与处理》 CSCD 北大核心 2016年第5期882-889,共8页 Journal of Data Acquisition and Processing
基金 澳门科学技术发展基金(FDCT0562012A2)资助项目
关键词 图像散列 分块压缩感知 随机投影 图像鉴别 image hashing block compressed sensing random projection image authentication
  • 相关文献

参考文献18

  • 1Zhao Y,Wang S,Zhang X,et al.Robust hashing for image authentication using Zernike moments and local features[J].IEEE Transactions on Information Forensics and Security,2013,8(1):55-63.
  • 2Shin J,Kim D,Ruland C.Content based image authentication using HOG feature descriptor[C]//Proceedings of IEEE In-ternational Conference on Image Processing(ICIP).Paris,France:IEEE,2014:5292-5296.
  • 3Lu C S,Hsu C Y,Sun S W,et al.Robust mesh-based hashing for copy detection and tracing of images[C]//Proceedings ofIEEE International Conference on Multimedia and Expo(ICME).Taipei,China:IEEE,2004,1:731-734.
  • 4Weng L,Amsaleg L,Morton A,et al.A privacy-preserving framework for large-scale content-based information retrieval[J].IEEE Transactions on Information Forensics and Security,2015,10(1):152-167.
  • 5Menezes A J,Van Oorschot P C,Vanstone S A.Handbook of applied cryptography[M].Boca Raton:CRC Press,1996.
  • 6Monga V,Banerjee A,Evans B L.A clustering based approach to perceptual image hashing[J].IEEE Transactions on Infor-mation Forensics and Security,2006,1(1):68-79.
  • 7蔺博宇,郭志刚,李弼程,高毫林,彭天强.基于随机化映射和模式熵的近似重复图像检测[J].数据采集与处理,2012,27(3):363-367. 被引量:4
  • 8Kozat S S,Venkatesan R,Mihcak M K.Robust perceptual image hashing via matrix invariants[C]//Proceedings of IEEEInternational Conference on Image Processing(ICIP).Singapore:IEEE,2004:3443-3446.
  • 9Swaminathan A,Mao Y,Wu M.Robust and secure image hashing[J].IEEE Transactions on Information Forensics and Se-curity,2006,1(2):215-230.
  • 10LüX,Wang Z J.Perceptual image hashing based on shape contexts and local feature points[J].IEEE Transactions on Infor-mation Forensics and Security,2012,7(3):1081-1093.

二级参考文献10

  • 1张立保,马新悦,陈琪.基于感兴趣区的图像零水印算法[J].通信学报,2009,30(S2):117-120. 被引量:8
  • 2Kim H, Chang H, Lee J, et al. Basil: effective near-duplicate image detection using gene sequence align- ment [C] // Proceedings of the ECIR. Milton Keynes, UK : ACM Press, 2010z 229-240.
  • 3Zhang D Q, Chang S F. Detecting image near-dupli- cate by stochastic attributed relational graph match- ing with learning[C]//Porceedings of the ACM In- ternational Conference on Multimedia. New York, USA: ACM Press, 2004: 877-884.
  • 4Zhao W L, Ngo C W. Scale-rotation invariant pat- tern entropy for key point-based near-duplicate de- tection[J3. IEEE Transactions on Image Processing, 2009,18(2): 412-423.
  • 5Xu D, Cham T, Yan S, et al. Near duplicate identi- fication with spatially aligned pyramid matching[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2010, 20(8): 1068-1079.
  • 6Andoni A, Indyk P. ELSH 0:1 User Manual[EB/ OL]. (2005-06-21). http:// www. mit. edu/- an- doni/LSH/manual, pdf.
  • 7Lowe D. Distinctive image features from scale-in- variant keypoints[J]. International Journal on Com- puter Vision, 2004, 60(2): 91-110.
  • 8Ke Y, Suthankar R, Huston L. Efficient near-dupli- cate detection and sub-image retrieval[C]//Proceed- ings of the ACM International Conference on Multi- media. New York, USA: ACM Press, 2004: 869- 876.
  • 9牛夏牧,焦玉华.感知哈希综述[J].电子学报,2008,36(7):1405-1411. 被引量:97
  • 10温泉,孙锬锋,王树勋.零水印的概念与应用[J].电子学报,2003,31(2):214-216. 被引量:282

共引文献38

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部