期刊文献+

一种新型抗旋转攻击的鲁棒哈希算法

New Robust Hash Algorithm for Image Against Rotation Attack
在线阅读 下载PDF
导出
摘要 鲁棒哈希算法是指通过匹配两个短的哈希向量,并以此度量两个图像之间的相似度的一种验证算法.与传统的水印方法相比较,鲁棒哈希不需要在图像中嵌入信息,也就不需要修改源图像,因此,鲁棒哈希能够提供更高的鲁棒性.由于鲁棒哈希具有效率高、实用性广的特点,正逐步成为未来图像认证与身份鉴别的主要技术.本文提出一种新的鲁棒图像哈希算法,该算法在有效的抵抗旋转攻击的同时,在效率和容错性方面与近期文献相比,也具有很大的优势. Robust hash method is a verification algorithm which measures the similarity between two images by matching two short hash vectors. Comparing to traditional watermarking, robust hash does not need to embed information in images, and not need to modify the source image, therefore, it can provide more robustness. Since robust hash has high efficiency and wide applicability, it is becoming the major technology in future image authentication. This paper presents a new robust image hash algorithm which can effectively against rotation attack, in the same time, has a great advantage of efficiency and fault-tolerance compared with the recent literature.
出处 《小型微型计算机系统》 CSCD 北大核心 2011年第4期668-671,共4页 Journal of Chinese Computer Systems
基金 辽宁省教育厅基金项目(2009A665)资助 辽宁省自然科学基金项目(20102202)资助 沈阳师范大学实验中心主任基金项目(SY200906)资助
关键词 鲁棒 哈希 旋转攻击 水印 robust hash rotation attack watermark
  • 相关文献

参考文献10

  • 1Fridrich J, Goljan M. Robust hash functions for digital watermarking[ C ]. Proceedings, International Conference on Information Technology : Coding and Computing, 2000.
  • 2Monga V, Evans B L. Perceptual image hashing via feature points: performance evaluation and tradeoffs [ C]. IEEE Transactions on Image Processing, 2006, 15(11) :3452-3465.
  • 3Queluz M P. Towards robust, content based techniques for image authentication[C]. IEEE Second Workshop on Multimedia Signal Processing, 1998.
  • 4Kozat S S, Venkatesan R, Mihcak M K. Robust perceptual image hashing via matrix invariants[C]. International Conference on Image Processing( ICIP), 2004.
  • 5Venkatesan R, Koon S M, Jakubowski M H, et al. Robust image hashing[C]. Proceedings, International Conference on Image Processing, 2000.
  • 6Swaminathan A, Mao Yi-nian, Wu Min. Robust and secure image hashing[C]. IEEE Transactions on Information Forensics and Security, 2006, 215-230.
  • 7Regunathan R, Ziyou X, Nasir M. On the security of the visual hash function[J]. Journal of Electronic Imaging, 2005, 14 ( 1 ) : 11-13.
  • 8Coskun B, Memon N. Confusion/Diffusion capabilities of some robust hash functions[C]. Proc. of 40th Annual Conference on Information Sciences and Systems, IEEE, 2006, 1188-1193.
  • 9Wang J Z, Li J, Wiederhold G. SIMPLIcity: semantics-sensitive integrated matching for picture libraries[ J]. IEEE Trans. on Pattern Analysis and Machine Intelligence, 2001,23 (9) :947-963.
  • 10Zhang Hui, Zhang Hal-bin, Li Qiong, et al. A multi-channel combination method of image perceptual hashing[C]. Fourth International Conference on Networked Computing and Advanced Information Management, NCM, 2008.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部