期刊文献+

基于PCA特征距离的图像哈希算法 被引量:11

Image Hashing Algorithm Based on PCA Feature Distance
下载PDF
导出
摘要 本文将主成分分析(PCA)应用于图像哈希,设计基于特征距离的感知哈希算法。该算法从规范化图像中构造适合于数据降维的二次图像,接着对其进行PCA处理,用PCA降维特征的距离生成哈希序列。实验结果表明本文算法的接收机操作特性曲线的分类性能优于现有的3种哈希算法。大规模图像库的拷贝检测显示,本文算法有较好的拷贝检测性能。 Principal component analysis(PCA)is applied to image hashing algorithm and a perceptual hashing algorithm based on characteristic distance is proposed.In the proposed algorithm,a secondary image suitable for data dimension reduction is first constructed from the normalized image.Then,PCA is used to process secondary image,and the distance between PCA features is finally exploited to form image hash.Experimental results illustrate that classification performance of the proposed algorithm measured with receiver operating characteristics(ROC)curve is better than those of three existing hashing algorithms.Copy detection under a large-scale image database shows that the proposed algorithm has good performance in detecting image copies.
出处 《广西师范大学学报(自然科学版)》 CAS 北大核心 2016年第4期9-18,共10页 Journal of Guangxi Normal University:Natural Science Edition
基金 国家自然科学基金资助项目(61300109 61363034 61562007) 广西自然科学基金资助项目(2015GXNSFDA139040) 广西"八桂学者"工程专项经费资助项目 广西高等学校优秀中青年骨干教师培养工程资助项目(GXGQ012013059) 广西多源信息挖掘与安全重点实验室系统性研究基金资助项目(15-A-02-02 14-A-02-02 13-A-03-01)
关键词 感知哈希函数 主成分分析 数据降维 图像拷贝检测 图像检索 perceptual hash function principal component analysis(PCA) data dimension reduction image copy detection image retrieval
  • 相关文献

参考文献3

二级参考文献46

  • 1尹浩,林闯,邱锋,丁嵘.数字水印技术综述[J].计算机研究与发展,2005,42(7):1093-1099. 被引量:134
  • 2Fridrich J, Goljan M. Robust hash function for digital watermarking [C //Proc of Int Conf on Information Technology: Coding and Computing. Los Alamitos, CA: IEEE Computer Society, 2000:173-178.
  • 3Petitcolas F A P, Anderson R J, Kuhn M G. Inormation hiding--A survey [-J. Proceeding of the IEEE, 1999, 87 (7) 1062-1078.
  • 4Zhang Xinpeng, Wang Shuozhong. Fragile watermarking with error-free restoration capability EJ. IEEE Trans on Multimedia, 2008, 10(8) : 1490-1499.
  • 5Roover C D, Vleeschouwer C D, Lefbvre F, et al. Robust video hashing based on radial projections of key frames EJ. IEEE Trans on Signal Processing, 2005, 53(10) : 4020-4037.
  • 6Saad S M. Design of a robust and secure digital signature scheme for image authentication over wireless channels [-J. IET Information Security, 2009, 3(1): 1-8.
  • 7Swaminathan A, Mao Yinian, Wu Min. Robust and secure image hashing [J. IEEE Trans on Information Forensics and Security, 2006, 1(2): 215-230.
  • 8Kozat S S, Venkatesan R, Mihcak M K. Robust perceptual image hashing via matrix invariants [C] ]]Proc of Int Conf on Image Processing. Piscataway, NJ IEEE Signal Processing Society, 2004 3443-3446.
  • 9Monga V, Mheak M K. Robust and secure image hashing via non negative matrix factorizations [J. IEEE Trans on Information Forensics and Security, 2007, 2(3). 376-390.
  • 10Chan T F, Shen J. Nontexture inpainting by curvature- driven diffusions [J. Journal of Visual Communication and Image Representation, 2001, 12(4) 436-449.

共引文献7

同被引文献38

引证文献11

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部