Research on Image Fingerprint Technology Based on Watson Visual Model Multimedia Technology

作者: Zhang Chi

DOI: 10.1007/978-3-319-60744-3_14

关键词:

摘要: Computer network has greatly changed the life and work of people, demand people for information been developed from single text message to current graphics, images, audio, video other digital multimedia forms. With development a large number applications, image is easy be operated tampered, this paper aims study an fingerprint algorithm based on masking characteristics human eye. An sensing Hash visual model proposed effectively eliminate influence geometric attacks. Watson used deal with DCT coefficients produce sequences, which excellent robustness security. The experiment proves that can certify copyright image, reduce attacks, JPEG compression it also use key generate pseudo-random matrix, so as encrypt realize security algorithm.

参考文章(10)
Lahouari Ghouti, Robust perceptual color image hashing using quaternion singular value decomposition international conference on acoustics, speech, and signal processing. pp. 3794- 3798 ,(2014) , 10.1109/ICASSP.2014.6854311
Ton Kalker, Jaap Haitsma, Job C. Oostveen, Issues with digital watermarking and perceptual hashing ITCom 2001: International Symposium on the Convergence of IT and Communications. ,vol. 4518, pp. 189- 197 ,(2001) , 10.1117/12.448203
Fang Liu, Hui Wang, Lee-Ming Cheng, Anthony T.S. Ho, Shujun Li, Enhanced perceptual image authentication with tamper localization and self-restoration international conference on multimedia and expo. pp. 1- 6 ,(2014) , 10.1109/ICME.2014.6890128
Supakorn Prungsinchai, Fouad Khelifi, Ahmed Bouridane, Fourier-Mellin transform for Robust Image Hashing 2013 Fourth International Conference on Emerging Security Technologies. pp. 58- 61 ,(2013) , 10.1109/EST.2013.17
Junio Cesar de Lima, Cedric Luiz de Carvalho, Content-based Image Authentication: Current Status, Issues, and Challenges international conference on semantic computing. pp. 630- 636 ,(2007) , 10.1109/ICSC.2007.25
Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei, Yan Zhao, Lexicographical framework for image hashing with implementation based on DCT and NMF Multimedia Tools and Applications. ,vol. 52, pp. 325- 345 ,(2011) , 10.1007/S11042-009-0437-Y
Andrew B. Watson, DCT quantization matrices visually optimized for individual images IS&T/SPIE's Symposium on Electronic Imaging: Science and Technology. ,vol. 1913, pp. 202- 216 ,(1993) , 10.1117/12.152694
Debin Hu, Ping Hu, Hui Zhang, A Perceptual Hashing Algorithm Based on Adjustable Visual Threshold international conference on intelligent systems design and engineering applications. ,vol. 1, pp. 133- 136 ,(2010) , 10.1109/ISDEA.2010.243
Shui-Hua Han, Chao-Hsien Chu, Content-based image authentication: current status, issues, and challenges International Journal of Information Security. ,vol. 9, pp. 19- 32 ,(2010) , 10.1007/S10207-009-0093-2
Fitri Arnia, Khairul Munadi, Masaaki Fujiyoshi, Hitoshi Kiya, None, Efficient content-based copy detection using signs of DCT coefficient ieee symposium on industrial electronics and applications. ,vol. 1, pp. 494- 499 ,(2009) , 10.1109/ISIEA.2009.5356423