期刊文献+

基于对立色与显著区域的紧凑图像哈希算法 被引量:1

Compact Image Hashing Algorithm Based on Opposite Color and Salient Region
下载PDF
导出
摘要 为了有效利用图像的颜色与局部信息提高算法识别能力,提出了一种基于颜色信息与显著区域的紧凑图像哈希算法.首先对输入图像进行预处理,然后提取图像的颜色对立色与亮度分量,并从颜色对立色中获取颜色特征,进而对亮度分量按照视觉注意力权重矩阵提取图像显著区域的稳健特征,最后将所有特征联合起来并扰乱得到最终的哈希序列.实验结果表明,所提算法与已有的哈希算法对比具有更好的图像分类性能、较短的哈希长度和较少的运算时间.同时,在篡改检测上具有较好的识别能力. In order to improve the recognition ability of algorithms by utilizing the color and local information of the image effectively,this paper proposes an image hashing algorithm based on color information and salient region.By reprocessing the input image,the proposed algorithm first obtains the color opponents’components and brightness components from the image.Then extracts the color features from the color opposition and the robust features of the salient areas from the image according to the visual attention weight matrix.Finally,the algorithm generates the final hashby combining and scrambling all these features.Experimental results show that the proposed algorithm performs with better image classification,shorter hash length and less computing time than the existing hash algorithms.Meanwhile,it also performs a good recognition ability in tampering detection application.
作者 赵琰 周晓炜 沈麒 ZHAO Yan;ZHOU Xiaowei;SHEN Qi(College of Electronics&Information Engineering,Shanghai University of Electric Power,Shanghai 200090,China;Guangxi Key Lab of Multi-source Information Mining&Security,Guangxi Normal University,Guilin 541004,Guangxi Province,China)
出处 《应用科学学报》 CAS CSCD 北大核心 2019年第5期691-703,共13页 Journal of Applied Sciences
基金 国家自然科学基金(No.61802250) 广西多源信息挖掘与安全重点实验室开放基金(No.MIMS18-04)资助
关键词 颜色对立色 亮度分量 视觉注意力 篡改检测 color opponent component brightness component visual attention tampering detection
  • 相关文献

参考文献3

二级参考文献23

  • 1KOZAT S S, MIHCAK M K, VENKATESAN R. Robust perceptual image hashing via matrix invariants [ C ]//Proc of IEEE Conference on Image Processing. Piscataway: IEEE Press,2004:3443- 3446.
  • 2XIANG Shi-jun, KIM H J, HUANG Ji-wu. Histogram-based image hashing scheme robust against geometric deformations [ C ]//Proc of the 9th ACM Multimedia and Security Workshop. New York: ACM Press, 2007 : 121 - 128.
  • 3TANG Zhen-jun, WANG Shuo-zhong, ZHANG Xin-peng, et al. Robust image hashing for tamper detection using non-negative matrix factorization[J]. Journal of Ubiquitous Convergence and Technology,2008,2( 1 ) :18-26.
  • 4AHMED F, SIYAL M Y, ABBAS V U. A secure and robust hash- based scheme for image authentication [ J ]. Signal Processing, 2010,90(5): 1456-1470.
  • 5FRIDRICH J, GOLJAN M. Robust hash functions for digital water marking[ C]//Proc of IEEE International Conference on Informatio Technology : Coding and Computing. Washington DC : IEEE Computer Society ,2000 : 178-183.
  • 6WU Di, ZHOU Xue-bing, NIU Xia-mu. A novel image hash algorithm resistant to print-scan [ J ]. Signal Processing, 2009,89 (12) : 2415-2424.
  • 7SWAMINATHAN A, MAO Yi-nian, WU Min. Robust and secure image hashing[J]. IEEE Trans on Information Forensics and Security,2006,1 (2) :215-230.
  • 8LI Shan, LEE M C, PUN C M. Complex Zernike moments features for shape-based image retrieval [J]. IEEE Trans on Systems, Man, and Cybernetics-part A: Systems and Humans,2009,39 (1): 227- 237.
  • 9PETITCOLAS F A P. Watermarking schemes evaluation [J]. IEEE Signal Processing Magazine ,2000,17 (5) :58-64.
  • 10ZHAO Yan, WANG Shuo-zheng, FENG Guo-rui, et al. A robust image hashing method based on Zernike moments [ J]. Journal of Computational Information Systems, 2010,6(3) :717-725.

共引文献8

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部