首页 | 本学科首页   官方微博 | 高级检索  
     检索      

稳健图像Hash研究进展
引用本文:王朔中,张新鹏.稳健图像Hash研究进展[J].上海大学学报(英文版),2007,11(4):323-331.
作者姓名:王朔中  张新鹏
作者单位:School of Communication and Information Engineering Shanghai University,School of Communication and Information Engineering,Shanghai University,Shanghai 200072,P.R.China,Shanghai 200072,P.R.China
基金项目:国家自然科学基金;上海市青年科技启明星计划
摘    要:The easy generation, storage, transmission and reproduction of digital images have caused serious abuse and security problems. Assurance of the rightful ownership, integrity, and authenticity is a major concern to the academia as well as the industry. On the other hand, efficient search of the huge amount of images has become a great challenge. Image hashing is a technique suitable for use in image authentication and content based image retrieval (CBIR). In this article, we review some representative image hashing techniques proposed in the recent years, with emphases on how to meet the conflicting requirements of perceptual robustness and security. Following a brief introduction to some earlier methods, we focus on a typical two-stage structure and some geometric-distortion resilient techniques. We then introduce two image hashing approaches developed in our own research, and reveal security problems in some existing methods due to the absence of secret keys in certain stage of the image feature extraction, or availability of a large quantity of images, keys, or the hash function to the adversary. More research efforts are needed in developing truly robust and secure image hashing techniques.

关 键 词:图像散列法  鲁棒性  图像鉴别  信息安全
收稿时间:11 May 2007
修稿时间:2007-05-11

Recent development of perceptual image hashing
WANG Shuo-zhong,ZHANG Xin-peng.Recent development of perceptual image hashing[J].Journal of Shanghai University(English Edition),2007,11(4):323-331.
Authors:WANG Shuo-zhong  ZHANG Xin-peng
Institution:School of Communication and Information Engineering, Shanghai University, Shanghai 200072, P. R. China
Abstract:The easy generation,storage,transmission and reproduction of digital images have caused serious abuse and security problems.Assurance of the rightful ownership,integrity,and authenticity is a major concern to the academia as well as the industry.On the other hand,efficient search of the huge amount of images has become a great challenge.Image hashing is a technique suitable for use in image authentication and content based image retrieval (CBIR).In this article, we review some representative image hashing techniques proposed in the recent years,with emphases on how to meet the conflicting requirements of perceptual robustness and security.Following a brief introduction to some earlier methods,we focus on a typical two-stage structure and some geometric-distortion resilient techniques.We then introduce two image hashing approaches developed in our own research,and reveal security problems in some existing methods due to the absence of secret keys in certain stage of the image feature extraction,or availability of a large quantity of images,keys,or the hash function to the adversary.More research efforts are needed in developing truly robust and secure image hashing techniques.
Keywords:image hashing  perceptual robustness  security  image authentication  
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
点击此处可从《上海大学学报(英文版)》浏览原始摘要信息
点击此处可从《上海大学学报(英文版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号