Image Hash Authentication Scheme Based on Composite Domain

被引:0
作者
Song, Baolin [1 ]
Wang, Chunxing [1 ]
机构
[1] Shandong Normal Univ, Coll Phys & Elect, Jinan 250014, Peoples R China
来源
2014 INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING AND AUTOMATION (ICMEA) | 2014年
关键词
DCT-DWT composite domain; Wavelet decomposition; robust Harris corner points; singular value decomposition (SVD); Normalized Hamming distance; ROBUST;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A new image hash scheme is proposed in this study, which depends on the characteristics of robust Harris corner points and DCT-DWT composite domain. The contributions are as follows: 1) the hash is robust against image tampering and malicious attacks 2) the signature extracted by this scheme helps conserve storage space. Experimental results indicate that the scheme is more robust against JPEG lossy compression, channel additive noise, brightness changes, filtering and a large class of attacks, including image tampering or large geometric transforms (e.g. rotation, extrusion, and cutting) than current single-domain extracting schemes, which results in an improved level of image security and robustness.
引用
收藏
页码:268 / 273
页数:6
相关论文
共 8 条
[1]  
Cox IngemarJ., 1997, INT C IMAGE PROCESSI, P3
[2]  
Gu E., IEEE INT C INT INF H
[3]  
Jin Qingming, 2008, CHINESE GRAPHICS LEA, V13, P1454
[4]  
Lin C.Y, P ACM MULT SEC WORKS
[5]   Robust and secure image hashing via non-negative matrix factorizations [J].
Monga, Vishal ;
Mihcak, M. Kivanc .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (03) :376-390
[6]   A clustering based approach to perceptual image hashing [J].
Monga, Vishal ;
Banerjee, Arindam ;
Evans, Brian L. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (01) :68-79
[7]   Robust and secure image hashing [J].
Swaminathan, Ashwin ;
Mao, Yinian ;
Wu, Min .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (02) :215-230
[8]  
Wang Chunxing, 2011, VIDEO WATERMARKING S, P864