期刊文献+

基于边缘和局部熵融合的视觉安全性评估方法 被引量:1

Evaluation Method of Visual Security Based on Edge Similarity and Local Entropy Adaptive Fusion
下载PDF
导出
摘要 针对基于局部熵进行加密图像视觉安全性评估存在块效应的局限性,引入图像的边缘特征,通过共有边缘来衡量加密图像与原始图像的边缘相似度,消除了块效应。由于局部熵对加密等级低的图像不敏感,边缘相似度对加密等级高的图像不敏感,将两个评估方法进行自适应融合,提出SLEES(Local Entropy and Edge Similarity,SLEES)指标。通过改变图像像素位置和图像像素值的加密方式处理图像和视频帧进行测试,实验结果表明,SLEES指标相比传统评估指标有更好的鲁棒性,评估范围更广。 Aiming at the limitation of encryption visual security based on local entropy,the edge figure of the image is proposed.The edge similarity of encrypted image is measured by the shared edge,which eliminates the blocking effect of local entropy.Since the local entropy is insensitive to images with low encryption level and the edge similarity is insensitive to images with high encryption level,the two evaluation methods have a self-adaptive convergence and the index SLEES(Local Entropy and Edge Similarity,SLEES)is proposed.The images and video frames are processed by changing the pixel position and pixel value and then are tested.The experimental results indicate that the proposed index SLEESis more robust than the traditional evaluation indexes,and the evaluation range is wider.
作者 胡慧 徐正全 HU Hui;XU Zhengquan(State Key Laboratory of Information Engineering in Surveying,Mapping and Remote Sensing,Wuhan University,Wuhan 430079,China)
出处 《计算机工程与应用》 CSCD 北大核心 2020年第12期215-222,共8页 Computer Engineering and Applications
基金 国家自然科学基金(No.41371402,No.41671443)。
关键词 视觉安全性 边缘相似度 局部熵 自适应融合 visual security edge similarity local entropy adaptive fusion
  • 相关文献

参考文献3

二级参考文献43

  • 1杨志云,陈琳,李伟,徐正全.利用随机数序列加密视频变长码字的新方法[J].华中科技大学学报(自然科学版),2007,35(3):8-11. 被引量:3
  • 2[1]ISO11172: ISO/MPEG90/176, Coding of Moving Pictures and Associated Audio[S].
  • 3[2]ITU - T Rec. H. 263, Video Coding for Narrow Telecommunication Channels at <64kbit/s[S].
  • 4[3]Wallace Gregory K. The JPEG still image compression standard [J]. Communications of the ACM, 1991,34(4): 30 ~44.
  • 5[4]Qao L, Nahrstedt K. A new algorithm for MPEG video encryption [A]. Proecedings of the First International Conference on Imaging Science, Systems and Technology (CISST97) [ C]. Las Vegas, Nevada: 1997. 21~29.
  • 6[5]NIST FIPS Publication 46 - 2, 1993, Data Encryption Standard [S].
  • 7[6]Tosun A S, Feng W C. Lightweight security mechanisms for wireless video transmission[ A]. Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC01)[C]. Las Vegas, Nevada: IEEE, 2001. 157 ~161.
  • 8[7]Agi I, Gong L. An empirical study of MPEG video transmissions [A]. Proceedings of the Internet Society Symposium on Network and Distributed System Security[ C]. San Diego,CA, 1996. 137~144.
  • 9[8]Romeo A, Romdotti G, Mattavelli M, et al. Cryptosystem architectures for very high throughput multimedia encryption: the RPK solution[A]. The 6th IEEE International Conference on Electronics, Circuits and Systems ( ICECS'99 ) [ C ]. Cyprus: Elsevier North-Holland, 1999. 261~264.
  • 10[9]Wee S J, Apostolopoulos J G. Secure scalable video streaming for wireless networks [ A ]. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing [ C ].Salt Lake City: IEEE, 2001. 2049 ~2052.

共引文献123

同被引文献14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部