首页 | 官方网站   微博 | 高级检索  
     

用于图像认证和窜改检测的稳健图像摘要*
引用本文:赵琰,魏为民. 用于图像认证和窜改检测的稳健图像摘要*[J]. 计算机应用研究, 2011, 28(5): 1929-1931. DOI: 10.3969/j.issn.1001-3695.2011.05.095
作者姓名:赵琰  魏为民
作者单位:1. 上海电力学院,计算机与信息工程学院,上海,200090;上海大学,通信与信息工程学院,上海,200072
2. 上海电力学院,计算机与信息工程学院,上海,200090
基金项目:上海市教育委员会科研创新项目资助(11YZ194)
摘    要:本文提出了一种用于图像认证和篡改检测的稳健图像摘要。该算法利用Zernike矩的幅度和修正后的相位旋转不变性生成图像摘要(图像Hash)。图像Hash之间的相似性用汉明距离度量。仿真结果表明该方法对大部分内容不变的图像操作具有鲁棒性。不同图像对Hash之间的汉明距离远大于阈值,因此该方法可用于图像认证。同时该方法还可以检测图像篡改并可以定位图像篡改的位置。

关 键 词:图像摘要,Zernike矩,图像认证,篡改检测
收稿时间:2010-09-10
修稿时间:2010-10-15

Robust image hashing for image authentication and tampering detection
ZHAO Yan,WEI Wei-min. Robust image hashing for image authentication and tampering detection[J]. Application Research of Computers, 2011, 28(5): 1929-1931. DOI: 10.3969/j.issn.1001-3695.2011.05.095
Authors:ZHAO Yan  WEI Wei-min
Affiliation:(1. School of Computer & Information Engineering, Shanghai Univ. of Electric Power, Shanghai 200090, China; 2. School of Communication & Information Engineering, Shanghai University, Shanghai 200072, China)
Abstract:In this paper, a robust image hashing method for image authentication and tampering detection is proposed. This method is based on rotation invariance of magnitudes and corrected phases of Zernike moments. Similarity between hashes is measured with the Hamming distance. Experimental results show that this method is robust against most content-preserving attacks. The Hamming distance of Hashes between two different images is bigger than the threshold. So this method can be used in image authentication. At the same time, this method can be used to detect tampering image, and can locate the tampered region in the image.
Keywords:image hash   Zernike moments   image authentication   tampering detection
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号