基于数据降维与对称二值模式的图像Hash算法
王彦超, 郭静博, 周丽宴. 基于数据降维与对称二值模式的图像Hash算法[J]. 激光与光电子学进展, 2017, 54(2): 021004.
Wang Yanchao, Guo Jingbo, Zhou Liyan. Image Hash Algorithm Based on Data Dimension Reduction and Symmetric Binary Pattern[J]. Laser & Optoelectronics Progress, 2017, 54(2): 021004.
[1] 林 超, 沈学举, 雷 鸣, 等. 基于三维空间正交偏振态复用的光学认证技术研究[J]. 光学学报, 2016, 36(3):0307001.
[2] Oommen R S, Jayamohan M, Sruthy S. Using fractal dimension and singular values for image forgery detection and localization [J]. Procedia Technology, 2016, 24: 1452-1459.
[3] Liu Z, Li Q, Niu X. Improve the security of image robust hash using fuzzy commitment scheme[J]. Neural Computing and Applications, 2013, 23(1): 67-72.
[4] 李新伟, 李雷达. 基于极谐变换的鲁棒图像哈希算法[J]. 计算机仿真, 2014, 31(5): 293-296.
Li Xinwei, Li Leida. Robust image hashing algorithm based on polar harmonic transform[J].Computer Simulation, 2014, 31(5): 293-296.
[5] Choi Y S, Park J H. Image hash generation method using hierarchical histogram[J]. Multimedia Tools and Applications, 2012, 61(1): 181-194.
[6] 曾 勇, 孙树森, 夏爱军. 基于图像归一化和DCT的感知图像哈希算法[J]. 浙江理工大学学报, 2012, 29(1): 84-88.
Zeng Yong, Sun Shusen, Xia Aijun. Image perceptual hashing based on image normalization and DCT[J]. Journal of Zhejiang Sci-Tech University, 2012, 29(1): 84-88.
[7] Sun R, Zeng W. Secure and robust image hashing via compressive sensing[J]. Multimedia Tools and Applications, 2014, 70(3): 1651-1665.
[8] 程相正, 曾朝阳, 陈 杭, 等. 基于双线性插值算法的低分辨率传感器标定方法[J]. 激光与光电子学进展, 2013, 50(7): 071501.
[9] 方旺盛, 李玉南, 张 蓉. 一种视觉模型引导的小波域彩色图像盲水印算法[J]. 计算机应用研究, 2011, 28(7): 2719-2722.
Fang Wangsheng, Li Yunan, Zhang Rong. Blind watermarking algorithm for color image guided by visual model[J]. Application Research of Computers, 2011, 28(7): 2719-2722.
[10] Zhang Z, Chen J, Li X, et al. An image matching method based on Fourier and LOG-polar transform[J]. Sensors & Transducers, 2014, 169(4): 61-66.
[11] 叶 珍, 白 璘, 粘永健. 基于Gabor特征与局部保护降维的高光谱图像分类[J]. 光学学报, 2016, 36(10): 1028003.
[12] Tiwari D, Tyagi V. A novel scheme based on local binary pattern for dynamic texture recognition[J]. Computer Vision and Image Understanding, 2016, 150: 58-65.
[13] 张智丰, 裴志利. 基于模糊局部二值模式算子的图像伪造检测[J]. 计算机工程与设计, 2015, 36(12): 3284-3290.
Zhang Zhifeng, Pei Zhili. Image forgery detection based on fuzzy local binary pattern operator[J].Computer Engineering and Design, 2015, 36(12): 3284-3290.
[14] Brinkhuis J, Protasov V. A new proof of the Lagrange multiplier rule[J]. Operations Research Letters, 2016, 44(3): 400-402.
[15] 赵 欣. 不同一维混沌映射的优化性能比较研究[J]. 计算机应用研究, 2012, 29(3): 913-915.
Zhao Xin. Research on the optimization performance comparison of different one-dimensional chaotic maps[J]. Computer Application of Research, 2012, 29(3): 913-915.
[16] Schaefer G, Stich M. UCID-an uncompressed colour image database[C]. SPIE, 2004, 5307: 472-480.
[17] Tang Z, Zhang X, Zhang S. Robust perceptual image hashing based on ring partition and nonnegative matrix factorization[J]. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(3): 711-724.
王彦超, 郭静博, 周丽宴. 基于数据降维与对称二值模式的图像Hash算法[J]. 激光与光电子学进展, 2017, 54(2): 021004. Wang Yanchao, Guo Jingbo, Zhou Liyan. Image Hash Algorithm Based on Data Dimension Reduction and Symmetric Binary Pattern[J]. Laser & Optoelectronics Progress, 2017, 54(2): 021004.