期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Recent development of perceptual image hashing 被引量:7
1
作者 王朔中 张新鹏 《Journal of Shanghai University(English Edition)》 CAS 2007年第4期323-331,共9页
The easy generation, storage, transmission and reproduction of digital images have caused serious abuse and security problems. Assurance of the rightful ownership, integrity, and authenticity is a major concern to the... The easy generation, storage, transmission and reproduction of digital images have caused serious abuse and security problems. Assurance of the rightful ownership, integrity, and authenticity is a major concern to the academia as well as the industry. On the other hand, efficient search of the huge amount of images has become a great challenge. Image hashing is a technique suitable for use in image authentication and content based image retrieval (CBIR). In this article, we review some representative image hashing techniques proposed in the recent years, with emphases on how to meet the conflicting requirements of perceptual robustness and security. Following a brief introduction to some earlier methods, we focus on a typical two-stage structure and some geometric-distortion resilient techniques. We then introduce two image hashing approaches developed in our own research, and reveal security problems in some existing methods due to the absence of secret keys in certain stage of the image feature extraction, or availability of a large quantity of images, keys, or the hash function to the adversary. More research efforts are needed in developing truly robust and secure image hashing techniques. 展开更多
关键词 image hashing perceptual robustness SECURITY image authentication.
下载PDF
Robust Image Hashing via Random Gabor Filtering and DWT 被引量:4
2
作者 Zhenjun Tang Man Ling +4 位作者 Heng Yao Zhenxing Qian Xianquan Zhang Jilian Zhang Shijie Xu 《Computers, Materials & Continua》 SCIE EI 2018年第5期331-344,共14页
Image hashing is a useful multimedia technology for many applications,such as image authentication,image retrieval,image copy detection and image forensics.In this paper,we propose a robust image hashing based on rand... Image hashing is a useful multimedia technology for many applications,such as image authentication,image retrieval,image copy detection and image forensics.In this paper,we propose a robust image hashing based on random Gabor filtering and discrete wavelet transform(DWT).Specifically,robust and secure image features are first extracted from the normalized image by Gabor filtering and a chaotic map called Skew tent map,and then are compressed via a single-level 2-D DWT.Image hash is finally obtained by concatenating DWT coefficients in the LL sub-band.Many experiments with open image datasets are carried out and the results illustrate that our hashing is robust,discriminative and secure.Receiver operating characteristic(ROC)curve comparisons show that our hashing is better than some popular image hashing algorithms in classification performance between robustness and discrimination. 展开更多
关键词 image hashing Gabor filtering chaotic map skew tent map discrete wavelet transform.
下载PDF
Content-based image hashing using wave atoms
3
作者 刘芳 梁瀚贤 +1 位作者 郑利明 季晓勇 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第4期38-48,共11页
It is well known that robustness, fragility, and security are three important criteria of image hashing; however how to build a system that can strongly meet these three criteria is still a challenge. In this paper, a... It is well known that robustness, fragility, and security are three important criteria of image hashing; however how to build a system that can strongly meet these three criteria is still a challenge. In this paper, a content-based image hashing scheme using wave atoms is proposed, which satisfies the above criteria. Compared with traditional transforms like wavelet transform and discrete cosine transform (DCT), wave atom transform is adopted for the sparser expansion and better characteristics of texture feature extraction which shows better performance in both robustness and fragility. In addition, multi-frequency detection is presented to provide an application-defined trade-off. To ensure the security of the proposed approach and its resistance to a chosen-plaintext attack, a randomized pixel modulation based on the Rdnyi chaotic map is employed, combining with the nonliner wave atom transform. The experimental results reveal that the proposed scheme is robust against content-preserving manipulations and has a good discriminative capability to malicions tampering. 展开更多
关键词 image hashing AUTHENTICATION wave atom transform chaotic system
下载PDF
Image block feature vectors based on a singular-value information metric and color-texture description 被引量:4
4
作者 王朔中 路兴 +1 位作者 苏胜君 张新鹏 《Journal of Shanghai University(English Edition)》 CAS 2007年第3期205-209,共5页
In this work, image feature vectors are formed for blocks containing sufficient information, which are selected using a singular-value criterion. When the ratio between the first two SVs axe below a given threshold, t... In this work, image feature vectors are formed for blocks containing sufficient information, which are selected using a singular-value criterion. When the ratio between the first two SVs axe below a given threshold, the block is considered informative. A total of 12 features including statistics of brightness, color components and texture measures are used to form intermediate vectors. Principal component analysis is then performed to reduce the dimension to 6 to give the final feature vectors. Relevance of the constructed feature vectors is demonstrated by experiments in which k-means clustering is used to group the vectors hence the blocks. Blocks falling into the same group show similar visual appearances. 展开更多
关键词 image feature COLOR TEXTURE content-based image retrieval (CBIR) image hashing
下载PDF
Extraction of color-intensity feature towards image authentication
5
作者 刘婷婷 王朔中 +1 位作者 张新鹏 郁志鸣 《Journal of Shanghai University(English Edition)》 CAS 2010年第5期337-342,共6页
A color-intensity feature extraction method is proposed aimed at supplementing conventional image hashing algorithms that only consider intensity of the image. An image is mapped to a set of blocks represented by thei... A color-intensity feature extraction method is proposed aimed at supplementing conventional image hashing algorithms that only consider intensity of the image. An image is mapped to a set of blocks represented by their dominant colors and average intensities. The dominant color is defined by hue and saturation with the hue value adjusted to make the principal colors more uniformly distributed. The average intensity is extracted from the Y component in the YCbCr space. By quantizing the color and intensity components, a feature vector is formed in a cylindrical coordinate system for each image block, which may be used to generate an intermediate hash. Euclidean distance is modified and a similarity metric introduced to measure the degree of similarity between images in terms of the color-intensity features. This is used to validate effectiveness of the proposed feature vector. Experiments show that the color-intensity feature is robust to normal image processing while sensitive to malicious alteration, in particular, color modification. 展开更多
关键词 feature extraction color space image hash tamper detection AUTHENTICATION
下载PDF
Lexicographic Image Hash Based on Space and Frequency Features
6
作者 赵琰 赵倩 仝明磊 《Journal of Donghua University(English Edition)》 EI CAS 2016年第6期899-902,共4页
A lexicographic image hash method based on space and frequency features was proposed.At first,the image database was constructed,and then color and texture features were extracted from the image blocks including infor... A lexicographic image hash method based on space and frequency features was proposed.At first,the image database was constructed,and then color and texture features were extracted from the image blocks including information for every image in the database,which formed feature vectors.The feature vectors were clustered to form dictionary.In hash generation,the image was preprocessed and divided into blocks firstly.Then color and texture features vectors were extracted from the blocks.These feature vectors were used to search the dictionary,and the nearest word in dictionary for each block was used to form the space features.At the same time,frequency feature was extracted from each block.The space and frequency features were connected to form the intermediate hash.Lastly,the final hash sequence was obtained by pseudo-randomly permuting the intermediate hash.Experiments show that the method has a very low probability of collision and a good perception of robustness.Compared with other methods,this method has a low collision rate. 展开更多
关键词 image hash LEXICOGRAPHIC discrete cosine transform(DCT) image authentication
下载PDF
A Verifiable Secret Image Sharing Scheme Based on Compressive Sensing
7
作者 LI Xinyan XIAO Di +1 位作者 MOU Huajian ZHANG Rui 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第3期219-224,共6页
This paper proposes a verifiable secret image sharing scheme based on compressive sensing, secret sharing, and image hashing. In this scheme, Toeplitz matrix generated by two chaotic maps is employed as measurement ma... This paper proposes a verifiable secret image sharing scheme based on compressive sensing, secret sharing, and image hashing. In this scheme, Toeplitz matrix generated by two chaotic maps is employed as measurement matrix. With the help of Shamir threshold scheme and image hashing, the receivers can obtain the stored values and the hash value of image. In the verifying stage and restoring stage, there must be at least t legal receivers to get the effective information. By comparing the hash value of the restored image with the hash value of original image, the scheme can effectively prevent the attacker from tampering or forging the shared images. Experimental results show that the proposed scheme has good recovery performance, can effectively reduce space, and is suitable for real-time transmission, storage, and verification. 展开更多
关键词 compressive sensing secret sharing measurement matrix image hashing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部