激光与光电子学进展, 2017, 54 (2): 021004, 网络出版: 2017-02-10   

基于数据降维与对称二值模式的图像Hash算法

Image Hash Algorithm Based on Data Dimension Reduction and Symmetric Binary Pattern
作者单位
1 平顶山教育学院计算机系, 河南 平顶山 467000
2 郑州大学信息工程学院, 河南 郑州 450001
摘要
为了解决当前图像Hash算法难以兼顾较高的感知稳健性与篡改识别率的不足, 提出了基于数据投影降维机制与对称局部二值模式的紧凑图像Hash算法。利用双线性插值来预处理图像, 使Hash具有固定的长度; 引入对数极坐标变换, 将其转变为二次图像; 利用Gabor滤波器平滑二次图像; 基于模糊集理论, 设计对称局部二值模式算子, 获取稳健特征; 定义数据投影降维机制与量化规则, 生成紧凑的中间Hash比特序列; 构造一维组合混沌映射, 建立加密模型, 完成比特序列扩散, 以生成图像Hash; 并引入汉明距离, 估算初始图像与接收端图像的Hash相似度, 联合决策阈值, 完成图像认证。测试数据表明, 与当前图像Hash技术相比, 该算法的Hash更紧凑, 且其感知稳健性与敏感性更高。
Abstract
In order to solve the problem of difficulty of both the high perception robustness and tampering identification rate in the current image Hash algorithm, the compact image Hash algorithm based on data projection dimension reduction mechanism and fuzzy symmetric local binary pattern is proposed. The generated Hash has a fixed length by introducing the bilinear interpolation mechanism to preprocess the image. And the pretreatment image is transformed into the secondary image by the log polar transformation. The secondary image is smoothed by Gabor filter. The fuzzy symmetric local binary pattern operator is designed based on the fuzzy theory. And the compact intermediate Hash sequence is got by defining the data projection dimension reduction mechanism. The image Hash is generated by diffusing the bit Hash based on designing the one-dimensional combined chaotic map. The similarity between the original image and the image of the receiving end is estimated by introduction the Hamming distance and decision threshold to finish the authentication of image. Testing data show that this algorithm has stronger perception robust and sensitivity with tighter Hash length than the current image Hash technologies.
参考文献

[1] 林 超, 沈学举, 雷 鸣, 等. 基于三维空间正交偏振态复用的光学认证技术研究[J]. 光学学报, 2016, 36(3):0307001.

    Lin Chao, Shen Xueju, Lei Ming, et al. Optical security validation based on orthogonal polarization multiplexing in three-dimensional space[J]. Acta Optica Sinica, 2016, 36(3): 0307001.

[2] Oommen R S, Jayamohan M, Sruthy S. Using fractal dimension and singular values for image forgery detection and localization [J]. Procedia Technology, 2016, 24: 1452-1459.

[3] Liu Z, Li Q, Niu X. Improve the security of image robust hash using fuzzy commitment scheme[J]. Neural Computing and Applications, 2013, 23(1): 67-72.

[4] 李新伟, 李雷达. 基于极谐变换的鲁棒图像哈希算法[J]. 计算机仿真, 2014, 31(5): 293-296.

    Li Xinwei, Li Leida. Robust image hashing algorithm based on polar harmonic transform[J].Computer Simulation, 2014, 31(5): 293-296.

[5] Choi Y S, Park J H. Image hash generation method using hierarchical histogram[J]. Multimedia Tools and Applications, 2012, 61(1): 181-194.

[6] 曾 勇, 孙树森, 夏爱军. 基于图像归一化和DCT的感知图像哈希算法[J]. 浙江理工大学学报, 2012, 29(1): 84-88.

    Zeng Yong, Sun Shusen, Xia Aijun. Image perceptual hashing based on image normalization and DCT[J]. Journal of Zhejiang Sci-Tech University, 2012, 29(1): 84-88.

[7] Sun R, Zeng W. Secure and robust image hashing via compressive sensing[J]. Multimedia Tools and Applications, 2014, 70(3): 1651-1665.

[8] 程相正, 曾朝阳, 陈 杭, 等. 基于双线性插值算法的低分辨率传感器标定方法[J]. 激光与光电子学进展, 2013, 50(7): 071501.

    Cheng Xiangzheng, Zeng Chaoyang, Chen Hang, et al. Calibration method of low-resolution sensor based on bilinear interpolation strategy[J]. Laser & Optoelectronics Progress, 2013, 50(7): 071501.

[9] 方旺盛, 李玉南, 张 蓉. 一种视觉模型引导的小波域彩色图像盲水印算法[J]. 计算机应用研究, 2011, 28(7): 2719-2722.

    Fang Wangsheng, Li Yunan, Zhang Rong. Blind watermarking algorithm for color image guided by visual model[J]. Application Research of Computers, 2011, 28(7): 2719-2722.

[10] Zhang Z, Chen J, Li X, et al. An image matching method based on Fourier and LOG-polar transform[J]. Sensors & Transducers, 2014, 169(4): 61-66.

[11] 叶 珍, 白 璘, 粘永健. 基于Gabor特征与局部保护降维的高光谱图像分类[J]. 光学学报, 2016, 36(10): 1028003.

    Ye Zhen, Bai Lin, Nian Yongjian. Hyperspectral image classification based on Gabor feature and local protection dimension reduction[J]. Acta Optica Sinica, 2016, 36(10): 1028003.

[12] Tiwari D, Tyagi V. A novel scheme based on local binary pattern for dynamic texture recognition[J]. Computer Vision and Image Understanding, 2016, 150: 58-65.

[13] 张智丰, 裴志利. 基于模糊局部二值模式算子的图像伪造检测[J]. 计算机工程与设计, 2015, 36(12): 3284-3290.

    Zhang Zhifeng, Pei Zhili. Image forgery detection based on fuzzy local binary pattern operator[J].Computer Engineering and Design, 2015, 36(12): 3284-3290.

[14] Brinkhuis J, Protasov V. A new proof of the Lagrange multiplier rule[J]. Operations Research Letters, 2016, 44(3): 400-402.

[15] 赵 欣. 不同一维混沌映射的优化性能比较研究[J]. 计算机应用研究, 2012, 29(3): 913-915.

    Zhao Xin. Research on the optimization performance comparison of different one-dimensional chaotic maps[J]. Computer Application of Research, 2012, 29(3): 913-915.

[16] Schaefer G, Stich M. UCID-an uncompressed colour image database[C]. SPIE, 2004, 5307: 472-480.

[17] Tang Z, Zhang X, Zhang S. Robust perceptual image hashing based on ring partition and nonnegative matrix factorization[J]. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(3): 711-724.

王彦超, 郭静博, 周丽宴. 基于数据降维与对称二值模式的图像Hash算法[J]. 激光与光电子学进展, 2017, 54(2): 021004. Wang Yanchao, Guo Jingbo, Zhou Liyan. Image Hash Algorithm Based on Data Dimension Reduction and Symmetric Binary Pattern[J]. Laser & Optoelectronics Progress, 2017, 54(2): 021004.

本文已被 3 篇论文引用
被引统计数据来源于中国光学期刊网
引用该论文: TXT   |   EndNote

相关论文

加载中...

关于本站 Cookie 的使用提示

中国光学期刊网使用基于 cookie 的技术来更好地为您提供各项服务,点击此处了解我们的隐私策略。 如您需继续使用本网站,请您授权我们使用本地 cookie 来保存部分信息。
全站搜索
您最值得信赖的光电行业旗舰网络服务平台!