首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
提出一种基于认证安全性的视觉Hash设计方案.通过对视觉Hash认证中鲁棒性、认证集合相互关系的分析,指出了采用多特征构造视觉Hash的必要性.多特征方法町以平衡视觉Hash认证中的虚警、漏警问题.设计了一种基于小波分解的视觉Hash算法.对多次分解的小波低频系数进行量化提取多重特征,利用精确Hash算法组合生成认证Hash.实验结果表明本方案对JPEG压缩、滤波、噪声等处理有良好的鲁棒性,且具有较好的认证安全性,可以用于图像的真实性认证.  相似文献   

2.
As an active forensic technology, perceptual image hash has important application in image content authenticity detection and integrity authentication. In this paper, we propose a hybrid-feature-based perceptual image hash method that can be used for image tampering detection and tampering localization. In the proposed method, we use the color features of image as global features, use point-based features and block-based features as local features, and combine with the structural features to generate intermediate hash code. Then we encrypt and randomize to generate the final hash code. Using this hash code, we present a coarse-to-fine grained forensics method for image tampering detection. The proposed method can realize object-level tampering localization. Abundant experimental results show that the proposed method is sensitive to content changes caused by malicious attacks, and the tampering localization precision achieves pixel level, and it is robust to a wide range of geometric distortions and content-preserving manipulations. Compared with the state-of-the-art schemes, the proposed scheme yields superior performance.  相似文献   

3.
Perceptual image hash is an emerging technology that is closely related to many applications such as image content authentication, image forging detection, image similarity detection, and image retrieval. In this work, we propose an image alignment based perceptual image hash method, and a hash-based image forging detection and tampering localization method. In the proposed method, we introduce an image alignment process to provide a framework for image hash method to tolerate a wide range of geometric distortions. The image hash is generated by utilizing hybrid perceptual features that are extracted from global and local Zernike moments combining with DCT-based statistical features of the image. The proposed method can detect various image forging and compromised image regions. Furthermore, it has broad-spectrum robustness, including tolerating content-preserving manipulations and geometric distortion-resilient. Compared with state-of-the-art schemes, the proposed method provides satisfactory comprehensive performances in content-based image forging detection and tampering localization.  相似文献   

4.
为了有效地实现图像Hash函数在图像认证检索中的应用,提出了结合Harris角点检测和非负矩阵分解(NMF)的图像Hash算法,首先提取图像中的角点,对角点周围图像块信息进行非负矩阵分解得到表征图像局部特征的系数矩阵,进一步量化编码产生图像Hash。实验结果表明,得到的图像Hash对视觉可接受的操作如图像缩放、高斯低通滤波和JPEG压缩具有良好的稳健性,同时能区分出对图像大幅度扰动或修改的操作。  相似文献   

5.
The rapid growth of digital multimedia and Internet technologies has made copyright protection, copy protection, and integrity verification three important issues in the digital world. To solve these problems, the digital watermarking technique has been presented and widely researched. Traditional watermarking algorithms are mostly based on discrete transform domains, such as the discrete cosine transform, discrete Fourier transform (DFT), and discrete wavelet transform (DWT). Most of these algorithms are good for only one purpose. Recently, some multipurpose digital watermarking methods have been presented, which can achieve the goal of content authentication and copyright protection simultaneously. However, they are based on DWT or DFT. Lately, several robust watermarking schemes based on vector quantization (VQ) have been presented, but they can only be used for copyright protection. In this paper, we present a novel multipurpose digital image watermarking method based on the multistage vector quantizer structure, which can be applied to image authentication and copyright protection. In the proposed method, the semi-fragile watermark and the robust watermark are embedded in different VQ stages using different techniques, and both of them can be extracted without the original image. Simulation results demonstrate the effectiveness of our algorithm in terms of robustness and fragility.  相似文献   

6.
摘 要:基于图像编码流的结构和相关性特点,提出了一种分组丢失顽健的可伸缩流认证方法。通过利用散列链和纠错编码算法构造认证算法,该方法可实现优化的码率分配以及非平等认证保护(UAP, unequal authentication protection)。首先对图像编码码流进行解析,获得层次结构信息和编解码依赖性;然后,根据码流数据对重构图像质量的重要程度,利用散列链将次重要的码流数据链接到重要数据上;最后对解码独立码流的散列值和整个码流的数字签名进行纠错编码,提高认证算法对分组丢失的顽健性。该方法仅需要对整个图像码流做一次签名,具有很低的认证代价。实验结果表明,与其他3种流认证算法相比,此法的认证图像具有更高的重构质量。  相似文献   

7.
Video hashing is a useful technique of many multimedia systems, such as video copy detection, video authentication, tampering localization, video retrieval, and anti-privacy search. In this paper, we propose a novel video hashing with secondary frames and invariant moments. An important contribution is the secondary frame construction with 3D discrete wavelet transform, which can reach initial data compression and robustness against noise and compression. In addition, since invariant moments are robust and discriminative features, hash generation based on invariant moments extracted from secondary frames can ensure good classification of the proposed video hashing. Extensive experiments on 8300 videos are conducted to validate efficiency of the proposed video hashing. The results show that the proposed video hashing can resist many digital operations and has good discrimination. Performance comparisons with some state-of-the-art algorithms illustrate that the proposed video hashing outperforms the compared algorithms in classification in terms of receiver operating characteristic results.  相似文献   

8.
崔鹏  王越 《光电子.激光》2017,28(10):1146-1155
针对现有的多数人脸识别算法在单训练样本时识 别性能并不理想这一问题,提出一种基于Fourier-Mellin变换的频域不 变性以及时域不变性的特征提取算法。首先,采用图像亮度作为原始特征,将对图像亮度标 准化以改善光照变化,通过应用2D小波变换降维来管理频域不变量的复杂度;然后,为进一 步改进识别性能,根据分析的Fourier-Mellien变换(AFMT) 以及正交Fourier-Mellin矩(OFMM)法不变量的特征,将两种算法混合,进行特征提取; 最后,利用分值标准化度量频域不变量与时域不变量,并存储到一个特征向量中用于分类。 通过最近邻分类器(NNC)和相关性系 数法(CCM)进行分类和融合。通过在YALE与ORL人脸数据库上进行了大量实验的结果表明, 本文提出方法的性能要优于传统的人脸识别算法。  相似文献   

9.
基于有限脊波变换的图像内容认证算法   总被引:1,自引:1,他引:0  
在有限脊波变换(FRIT,finite ridgelet transform)域,提出了一种用于图像内容认证的半易损数字水印算法。提取图像在FRIT时产生的均值信息作为图像内容特征,并由它生成认证水印。利用Bayesian最小风险函数估计选择FRIT系数,把认证水印嵌入这些系数。实验结果表明,此算法简便高效,能很好地区分图像内容的恶意篡改和偶然修改,并能确切指出篡改的位置。  相似文献   

10.
随着图像数据的迅猛增长,当前主流的图像检索方法采用的视觉特征编码步骤固定,缺少学习能力,导致其图像表达能力不强,而且视觉特征维数较高,严重制约了其图像检索性能。针对这些问题,该文提出一种基于深度卷积神径网络学习二进制哈希编码的方法,用于大规模的图像检索。该文的基本思想是在深度学习框架中增加一个哈希层,同时学习图像特征和哈希函数,且哈希函数满足独立性和量化误差最小的约束。首先,利用卷积神经网络强大的学习能力挖掘训练图像的内在隐含关系,提取图像深层特征,增强图像特征的区分性和表达能力。然后,将图像特征输入到哈希层,学习哈希函数使得哈希层输出的二进制哈希码分类误差和量化误差最小,且满足独立性约束。最后,给定输入图像通过该框架的哈希层得到相应的哈希码,从而可以在低维汉明空间中完成对大规模图像数据的有效检索。在3个常用数据集上的实验结果表明,利用所提方法得到哈希码,其图像检索性能优于当前主流方法。  相似文献   

11.
针对低信噪比条件下雷达信号分选识别算法识别率低且复杂度高的问题,提出了一种基于多重同步压缩变换(MSST)的雷达辐射源分选识别算法。首先通过MSST得到信号的时频图像矩阵;然后,对时频图像进行预处理,提取出时频图像的灰度共生矩阵纹理特征和Zernike矩特征;同时提取了信号的功率谱参数特征和平方谱统计特征,组成特征参数向量;最后利用支持向量机分类器实现了对雷达信号的自动分选识别。仿真结果表明,在信噪比为-2 dB时,该算法对9种雷达信号(CW、LFM、NLFM、BPSK、MPSK、Costas、LFM/BPSK、LFM/FSK和BPSK/FSK)的整体平均识别成功率大于96.5%。  相似文献   

12.
黄伟  冯径  柳亚婷  朱建 《电子设计工程》2012,20(10):186-188
提出了一种基于区域特征的结合IHS变换和小波变换的图像融合算法,首先分别对多光谱图像和高分辨率全色图像进行IHS变换和直方图匹配,对I分量和调整后的高分辨率图像进行小波分解,然后对不同频率分量进行融合时引入区域特征准则,低频部分采用加权平均算子融合法,高频部分采用改进的区域方差加权融合法,最后结合主观判断和客观定量分析验证该算法,实验结果表明该算法的融合图像的质量要优于传统的IHS变换法和小波变换法。  相似文献   

13.
基于Nonsubsampled Contourlet变换的SAR图像形状特征检索   总被引:1,自引:0,他引:1  
Nonsubsampled Contourlet变换是一种非抽取得具有平移不变性的多尺度多方向的变换。将Canny算子和Nonsubsampled Contourlet变换(NSCT)[1]相结合,对图像运用Canny算子[2]提取边缘特征,再进行Nonsubsampled Contourlet变换,引入了三阶中心矩作为特征向量提取形状特征的算法。实现了基于Nonsubsampled Contourlet变换的图像形状特征检索,并将结果与基于2-D小波变换和基于Contourlet变换的图像形状特征检索作了比较,实验结果证明该方法的图像形状特征检索效率有较大的提高。  相似文献   

14.
一种基于H.264/AVC的视频可逆脆弱水印算法   总被引:1,自引:0,他引:1  
结合H.264压缩编码标准的特性,该文提出一种新的基于H.264/AVC的视频可逆脆弱水印算法。算法先计算当前宏块预测残差块量化的离散余弦变换(DCT)系数的哈希值生成认证码,再把认证码作为水印信息嵌入到下一个相邻宏块活性最大的4′4块的最后一个非零量化DCT系数中。在解码端,通过比较认证码和提取的水印信息进行视频数据完整性的认证。实验结果表明,该算法对视频质量和码率的影响较小,并且能对认证通过的视频数据进行还原和对认证失败的视频Ⅰ帧遭篡改区域进行有效的定位。  相似文献   

15.
现有物理层挑战-响应认证机制使用无线信道信息掩藏密钥生成认证响应,一旦攻击方获得合法信道信息,则可直接破解密钥。针对上述问题,该文借鉴曲线匹配原理,提出一种基于哈希方法的物理层认证机制。首先,认证双方提取无线信道特征,并和认证密钥组合得到初始认证向量,该向量被等效为一条曲线;随后,采用具有容错性的单向哈希函数将该曲线映射为低维的哈希矢量,用作认证响应;最后,认证方根据需求设置认证门限,并根据响应的匹配结果进行判决。性能分析表明,所采用的哈希方法实质为欠定方程组,攻击方无法根据低维哈希矢量还原曲线信息,从而无法破解密钥;仿真结果表明,在攻击方窃取了合法信道信息的条件下,在4 dB时,现有挑战-响应机制攻击率约为0.5,该文所提机制可实现攻击率小于10-5 。  相似文献   

16.
人脸识别是一种重要的生物特征识别技术,它广泛应用于电脑开机、门禁系统、安全监控和重要场所的身份验证。该文提出了一种基于DCT的PCA特征提取方法,该算法先对整个原始人脸图像进行DCT变换得到系数矩阵,再提取包含原始图像大部分信息的少量系数作PCA,提取出特征脸,再进行分类识别。对ORL人脸库的仿真实验表明,该方法优于单独DCT与PCA特征提取的识别方法,并且减少了运算量。  相似文献   

17.
Because of the limit of angle of view(AOV) of IR imaging seeker during the approach of missile and target, the detector can only get the partial image sequence of aircraft nose after "lose point". Recognizing the axis direction on the basis of partial IR image sequence is a key issue of the advanced IR imaging guide airto-air missile faced. In this paper, a recognition method was proposed based on the morphological skeleton and modified Hough transform, and this method can recognize correctly the axis direction of aircraft nose in different poses during missile-target encounter. Firstly, the morphological skeleton transform was used for the extraction of skeleton features. Secondly, the modified Hough transform was used for the straight-lines detection. Finally, According to the relations between aircraft nose and axis and invariant of nose features in high-speed IR image sequence, the axis direction can be detected and calculated. Experimental results indicate that the method is feasible and effective, and the precision of axis direction recognized can meet the requirement of accurate burst control of GIF fuze.  相似文献   

18.
费佩燕  郭宝龙 《红外技术》2005,27(3):235-239
Introduction Infrared Image denoising is a basic problem of image processing.It is well known that the more prioriknowledge is used,the better filtering effect is gotten.Usually,we can only get a contaminated image and prioriknowledge of noise can not be gotten accurately so the filtering effect is not good.Wavelet denoising algorithmproposed by Donoho et al.[1]is widely used.It is considered the better denoising algorithm recently.However,itrequires size of image to determine the important …  相似文献   

19.
一种基于Hash函数的RFID安全认证方法   总被引:1,自引:0,他引:1  
钱萍  吴蒙 《电信科学》2011,27(10):109-112
近年来,射频识别(RFID)技术得到越来越多的应用,随之而来的是各种RFID安全问题。对现有的基于Hash函数的RFID认证协议进行分析,针对现有技术存在的不足,提出了一种基于Hash函数的低成本的RFID双向安全认证方法,该方法只需要进行一次Hash函数计算,且加入了标签ID动态更新机制,通过在后台数据库中存储旧的标签ID解决同步问题,与现有技术相比具有一定的优越性。  相似文献   

20.
基于海天/海岸线检测的舰船目标提取方法   总被引:1,自引:0,他引:1  
针对成像型反舰导弹所获红外图像的特点,提出了一种将海天/海岸线检测与目标提取相结合的舰船目标提取方法.该方法先综合运用Sobel边缘检测和局部Hough变换等数字图像处理技术从红外图像中检测出海天/海岸线,然后通过对Kapur熵二值化图像进行投影变换实现舰船目标提取.实验结果表明,该方法能够有效地确定舰船目标在海天/海...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号