计算机技术 |
|
|
|
|
结合结构与梯度的图像哈希算法 |
沈麒1,赵琰1,2,*(),周晓炜1,袁晓冉1 |
1. 上海电力大学 电子与信息工程学院,上海 200090 2. 广西师范大学 广西多源信息挖掘与安全重点实验室,广西 桂林 541004 |
|
Image Hashing algorithm based on structure and gradient |
Qi SHEN1,Yan ZHAO1,2,*(),Xiao-wei ZHOU1,Xiao-ran YUAN1 |
1. College of Electronics and Information Engineering, Shanghai University of Electric Power, Shanghai 200090, China 2. Guangxi Key Lab of Multi-source Information Mining and Security, Guangxi Normal University, Guilin 541004, China |
引用本文:
沈麒,赵琰,周晓炜,袁晓冉. 结合结构与梯度的图像哈希算法[J]. 浙江大学学报(工学版), 2020, 54(8): 1525-1533.
Qi SHEN,Yan ZHAO,Xiao-wei ZHOU,Xiao-ran YUAN. Image Hashing algorithm based on structure and gradient. Journal of ZheJiang University (Engineering Science), 2020, 54(8): 1525-1533.
链接本文:
http://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2020.08.010
或
http://www.zjujournals.com/eng/CN/Y2020/V54/I8/1525
|
1 |
VENKATESAN R, KOON S M, JAKUBOWSKI M H, et al. Robust image hashing [C]// Proceedings 2000 International Conference on Image Processing. Vancouver: IEEE, 2000: 664-666.
|
2 |
沈麒, 赵琰 基于小波分解的统计特征哈希[J]. 应用科学学报, 2018, 36 (2): 247- 254 SHEN Qi, ZHAO Yan Statistical feature hashing based on wavelet decomposition[J]. Journal of Applied Sciences, 2018, 36 (2): 247- 254
doi: 10.3969/j.issn.0255-8297.2018.02.004
|
3 |
TANG Z, YANG F, HUANG L, et al Robust image hashing with dominant DCT coefficients[J]. Optik: International Journal for Light and Electron Optics, 2014, 125 (18): 5102- 5107
doi: 10.1016/j.ijleo.2014.05.015
|
4 |
QIN C, CHANG C, TSOU P Robust image hashing using non-uniform sampling in discrete Fourier domain[J]. Digital Signal Processing, 2013, (23): 578- 585
|
5 |
李新伟, 夏秀珍 基于内容结构图的鲁棒图像哈希[J]. 应用科学学报, 2016, 34 (6): 691- 701 LI Xin-Wei, XIA Xiu-Zhen Robust image hashing based on content structure diagram[J]. Journal of Applied Sciences, 2016, 34 (6): 691- 701
doi: 10.3969/j.issn.0255-8297.2016.06.005
|
6 |
TANG Z, YAO H Robust image hashing via random Gabor filtering and DWT[J]. Computers Materials and Continua, 2018, 55 (2): 331- 344
|
7 |
HERMANDEZ R A P, MIYATAKE M N, KURKOSKI B M. Robust image hashing using image normalization and SVD decomposition [C]// IEEE International Midwest Symposium on Circuits and Systems. Seoul: IEEE, 2011: 1–4.
|
8 |
GHOUTI L Robust perceptual color image hashing using randomized hypercomplex matrix factorizations[J]. Multimedia Tools and Applications, 2017, (11): 1
|
9 |
唐振军, 杨帆, 黄紫晴, 等 基于PCA特征距离的图像哈希算法[J]. 广西师范大学学报: 自然科学版, 2016, 34 (4): 9- 18 TANG Zhen-jun, YANG Fan, HUANG Zi-qing, et al Image hashing algorithm based on pca feature distance[J]. Journal of Guangxi Normal University: Natural Science Edition, 2016, 34 (4): 9- 18
|
10 |
TANG Z, LAO H, ZHANG X, et al Robust image hashing via DCT and LLE[J]. Computers and Security, 2016, 62: 133- 148
doi: 10.1016/j.cose.2016.07.006
|
11 |
TANG Z, HUANG Z, ZHANG X, et al Robust image hashing with multidimensional scaling[J]. Signal Processing, 2017, 137: 240- 250
doi: 10.1016/j.sigpro.2017.02.008
|
12 |
TANG Z, CHEN L, ZHANG X, et al Robust image hashing with tensor decomposition[J]. IEEE Transactions on Knowledge and Data Engineering, 2019, 31 (3): 549- 560
doi: 10.1109/TKDE.2018.2837745
|
13 |
TANG Z, ZHANG X, LI X, et al Robust image hashing with ring partition and invariant vector distance[J]. IEEE Transactions on Information Forensics and Security, 2016, 11 (1): 200- 214
doi: 10.1109/TIFS.2015.2485163
|
14 |
ZHAO Y, WANG S, ZHANG X, et al Robust hashing for image authentication using zernike moments and local features[J]. IEEE Transactions on Information Forensics and Security, 2013, 8 (1): 55- 63
doi: 10.1109/TIFS.2012.2223680
|
15 |
DAVARZANI R, MOZAFFARI S, YAGHMAIE K Perceptual image hashing using center-symmetric local binary patterns[J]. Multimedia Tools and Applications, 2016, 75 (8): 4639- 4667
doi: 10.1007/s11042-015-2496-6
|
16 |
QIN C, CHEN X, LUO X, et al Perceptual image hashing via dual-cross pattern encoding and salient structure detection[J]. Information Sciences, 2018, 423: 284- 302
doi: 10.1016/j.ins.2017.09.060
|
17 |
TANG Z, ZHANG X, DAI X, et al Robust image hash function using local color features[J]. AEU-International Journal of Electronics and Communications, 2013, 67 (8): 717- 722
doi: 10.1016/j.aeue.2013.02.009
|
18 |
OSTU N A threshold selection method from gray-level histogram[J]. IEEE Transactions on Systems, Man, and Cybernetics, 1979, 9 (1): 62- 66
doi: 10.1109/TSMC.1979.4310076
|
19 |
赵琰, 魏为民 用于图像认证和窜改检测的稳健图像摘要[J]. 计算机应用研究, 2011, 28 (5): 1929- 1931 ZHAO Yan, WEI Wei-min Robust image hashing for image authentication and tampering detection[J]. Application Research of Computers, 2011, 28 (5): 1929- 1931
doi: 10.3969/j.issn.1001-3695.2011.05.095
|
20 |
FAWCETT T An introduction to ROC analysis[J]. Pattern Recognition Letters, 2006, 27 (8): 861- 874
doi: 10.1016/j.patrec.2005.10.010
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|