基于视觉模型的图像感知哈希算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
图像作为视觉的基本组成部分,是信息传播和知识积累过程中不可或缺的载体。然而,数字图像处理技术的进步给图像带来的诸多安全问题已经影响到公共安全等许多重要领域,使得针对图像的认证成为一个亟待解决的问题。
     图像的安全问题关键在于图像在应用过程中的基于内容的真实性和完整性,传统的数据认证和加密手段很难满足其应用需求。感知哈希基于媒体的感知内容,将媒体唯一地映射为一段数字摘要,具有对内容保持操作的鲁棒性和对内容篡改的区分性,并满足单向性、篡改定位性等要求,为媒体内容的识别和认证提供了一种有效的解决手段。图像的识别和认证本质上关注的是图像所传达的感知信息而非图像载体本身。现有图像哈希算法的特征提取至今停留在数据表达层面,没有上升到人类视觉系统的感知层面,从而导致现有图像哈希算法针对不同应用对象的鲁棒性、区分性和失真环境下的篡改定位性较差。
     本文从人类视觉系统的视觉模型出发,分析了结构化视觉模型与人眼视觉主观感受出现差异的原因,提出一种融合人类视觉系统的基本感知特性与整体结构化感知特性的视觉模型,进而分别针对原始域和变换域两类应用对象,基于该视觉模型,提出了一组能够实现良好鲁棒性、区分性和篡改定位性的图像哈希算法,为进一步增强图像哈希算法在失真环境下的篡改定位性,提出了一种通用的篡改定位模型,并将其应用到经典的图像哈希算法和设计新哈希算法上。
     本文的主要研究工作和创新点在于:
     (1)通过对人类视觉系统的基本构造和特性,以及传统视觉模型的分析,针对现有结构化模型没有考虑人类视觉系统亮度适应性和对比度掩蔽对视觉感知的影响这一局限性,将基于对视觉信息从人眼到大脑各个信息处理阶段模拟的传统视觉模型与人眼对图像的整体感受的结构化模型相结合,提出了一种新的人类视觉系统模型,实现了与人类视觉感知的高度一致性,并为哈希算法感知特征的提取提供了通用性的理论指导。
     (2)基于该视觉模型,提出了两种原始域的图像哈希算法。迭代尺度交互几何模型的原始域图像哈希算法通过与人类视觉反应最接近的Gabor滤波器提取人类视觉反应最为敏感的图像边缘信息,然后利用对旋转鲁棒的Radon变换将图像的边缘信息一维化生成哈希序列,从而获得了良好的鲁棒性、区分性和篡改定位性。该算法不受图像编码标准的约束,适用于各类图像。原始域环形模糊匹配图像哈希算法通过对特征点环形模糊匹配,有效提高了基于特征点的哈希算法的旋转鲁棒性。
     (3)基于该视觉模型,提出了两种变换域的图像哈希算法。基于DCT域的图像哈希算法通过直接从JPEG编码图像熵解码后的码流中提取感知不变特征,避免了DCT反变换,提高了哈希生成的效率,使得算法在保持了良好区分性的同时,不仅对高压缩率JPEG编码、直方图均衡化等内容保持操作非常鲁棒,而且还具备现有基于DCT域的图像哈希算法所缺乏的轻微旋转鲁棒性。基于DWT域的图像哈希算法通过提取DWT系数矩阵子带内的重要系数为感知不变特征,符合JPEG2000码流渐进式特点,实现了算法良好的鲁棒性、区分性和篡改定位性。
     (4)基于该视觉模型,提出了一种通用的篡改定位模型。图像在传输或存储的过程中,将不可避免地引入内容不变失真。现有哈希算法的篡改定位方案不能有效区分篡改和内容失真,从而导致他们的篡改定位性能随着图像失真程度的加大而迅速下降。本文提出的模型通过控制提取特征的鲁棒性,有效解决了提取特征鲁棒性与区分性之间的均衡性问题。基于该模型,现有图像哈希算法在失真环境下的篡改定位精度能够得到有效提高。
Images, as an essential carrier of vision information, are indispensable in the process of information transfer and knowledge accumulation. However, many major fields such as public security have been suffered threaten from the security of images brought by the development of digitial image processing techniques, which made image authentication techniques to an urgently issue to be solved.
     The key issues of the security of images lie on the authenticity and integrity during the use. These requirments are no longer satisfied by the conventional methods of authentication and encryption. Perceptual hashing also refers as robust hashing and fingerprinting, maps digital multimedia data into a compact digital digest based on their perceptual contents. Multimedia with different contents would be mapped into distinct hashing sequence, while multimedia with same contents would be mapped into same hashing sequence values. Robustness to content-preserving manipulations, sensitivity to malicious tampering and security are the basic criteria of perceptual hashing. Perceptual hashing supplies an efficient solution to image identification and authentication. It has a wide application in content-based identification, retrieval, tampering localization and etc. However, feature extraction of existing hashing algorithms concentrates on the data expression instead of the perception of human vision system, which degrades their robustness to content-preserving manipulations, sensibility to content changes, and tampering localization in distorted images.
     In this dissertation, the reasons why the structural statistics based human man vision (HVS) model could not correspond well with the judgments of human observers are analyzed. A novel HVS model which fuses the classical HVS model and the structural statistics based HVS model is proposed. Then, in the guidelines of the fusion models of human vision system, hashing algorithms based on pixel domain, DCT and DWT domain are propsed. In addition, a universal tampering localization model to improve the performance of existing hashing algorithms on tampering localization in distorted images is brought out.
     The major works of this dissertation are described as follow:
     Fistly, based on the classical HVS models which imitate the information processing from human eyes to human brains and the model which measures the human observers' feeling by structural statistics, the HVS fusion model is proposed. Experimental results show that, this fusion model is consistent with the judgements of human observers, serving as a feasible theroretical guideline for the extraction of robust features.
     Secondly, image hashing algorithms in the pixel domain are proposed. By Gabor filter, whose response is in accordance with HVS, the two dimensional (2D) edge features are extracted. Then, by Radon transform, which has high robustness to rotation, 2D edge features are transformed into one dimensional (1D) features. Last, by quantization of 1D features, hashing sequence is generated. Experimental results show that the above proposed algorithm is very robust to common content-preserving manipulations, sensitive to content changes, and has the performance on tampering localization. Since features are extracted in the pixel domain, the prposed hashing algorithms could be applied to images regardless of their storing formats. In addition, an hashing algorithms based on the fuzzy distance matching is proposed to improve the robustness of rotation for existing hashing algorithms with low level features.
     Thirdly, image hashing algorithms in DCT and DWT domains are proposed respectively. For the hashing algorithm in DCT domain, robust features are extracted from the bit stream which is entropy decoded for JPEG compressed images. Experimental results show that the proposed algorithm is not only robust to JPEG recompression, histogram equalization and some other content-preserving manipulations, but also robust to mild rotation attack, which is scarce for most existing hashing algorithms in DCT domain. For the hashing algorithm in DWT domain, significant bits in intra scales instead of inter scales are extracted, which is in accordance with the scalable property of JPEG2000 bits steam. Experimental results demonstrate the proposed algorithm excellant performance.
     Fourthly, a novel image hashing model for existing hashing algorithms to improve their performance on tampering localization in distorted images is proposed in this dissertation. Many image hashing algorithms have been proposed to detect the malicious tampering for content authentication. However, their tampering localization performance degrades dramatically on images with content-preserving distortion, as these algorithms cannot distinguish the malicious tampering from content-preserving distortion. In this framwork, high precision of tampering localization in distorted images is achieved by controlling the robustness of extracted features. By experimenting with classical image hashing algorithms, the correctness of the proposed model is proved.
引文
1罗四维.视觉感知系统信息处理理论[M].北京:电子工业出版社, 2006.
    2章毓晋.图象工程上册:图象处理和分析[M].北京:清华大学出版社,1999.
    3唐胜.多媒体数字签名技术研究[D].中国科学院博士论文, 2006.
    4章毓晋.基于内容的视觉信息检索[M].北京:科学出版社, 2003.
    5张慧.图像感知哈希测评基准及算法研究[D].哈尔滨工业大学博士论文, 2009.
    6 I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich and T. Kalker. Digital Watermarking and Steganography[M]. Morgan Kaufmann, 2008.
    7 J.S.Seo, J.Haitsma, T.Kalker and C.D.Yoo. A Robust Image Fingerprinting System Using the Radon Transform[J]. Signal processing: image communication, 2004, 19(4):325-339.
    8 B. Schneier. Applied Cryptography[M]. John Wiley & Sons, 1996.
    9 L. Ghouti, A. Bouridane. A Robust Perceptual Audio Hashing Using Balanced Multiwavelets[C]//Proceedings. IEEE International Conference on Acoustics, Speech and Signal Processing. ICASSP 2006. 2006, 5:V–V.
    10 O. Harmanci, V. Monga, M. K. Mihcak. Geometrically Invariant Image Watermarking via Robust Perceptual Hashes[C]//V. Monga. IEEE International Conference on Image Processing. 2006:1397–1400.
    11 V. Monga. Perceptually Based Methods for Robust Image Hashing[D]. The Univer-sity of Texas at Austin, 2005.
    12 V. Monga, A. Banerjee, B. L. Evans. A Clustering Based Approach to Perceptual Image Hashing[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(1):68–79.
    13 V. Monga, A. Banerjee, B. L. Evans. Clustering Algorithms for Perceptual Image Hashing[C]//A. Banerjee. IEEE 11th Digital Signal Processing Workshop and the 3rd IEEE Signal Processing Education Workshop. 2004:283–287.
    14 V. Monga, B. L. Evans. Robust Perceptual Image Hashing Using Feature Points[C]//B. L. Evans. International Conference on Image Processing. ICIP’04. 2004, 1:677–680 Vol. 1.
    15 V. Monga, B. L. Evans. Perceptual Image Hashing via Feature Points: Performance Evaluation and Tradeoffs[J]. IEEE Transactions on ImageProcessing, 2006, 15(11):3452–3465.
    16 S. S. Kozat, R. Venkatesan, M. K. Mihcak. Robust Perceptual Image Hashing via Matrix Invariants[C]//R. Venkatesan. International Conference on Image Processing. ICIP’04. 2004, 5:3443–3446.
    17 B. Yang, G. Fan, X. Niu. Block Mean Value Based Image Perceptual Hashing[C]//International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 06. 2006:167–172.
    18 H. Kevin, S. Martin, Z. Xuebing. Histogram-based Perceptual Hashing for Minimally Changing Video Sequences[C]//Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution. AXMEDIS’06. 2006:236–241.
    19 S. Voloshynovskiy, O. Koval, F. Beekhof, et al. Robust Perceptual Hashing as Classification Problem: Decision-theoretic and Practical Considerations[C]//IEEE 9th Workshop on Multimedia Signal Processing. MMSP. 2007:345–348.
    20 Y. Mao, M. Wu. Unicity Distance of Robust Image Hashing[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3):462–467.
    21 R. Venkatesan, S. M. Koon, M. H. Jakubowski, et al. Robust Image Hashing[C]//S. M. Koon. Proceedings. International Conference on Image Processing.2000, 3:664–666 vol.3.
    22 H. Ozer, B. Sankur, N. Memon. Robust Audio Hashing for Audio Identification, 2004.
    23 A. Fawad, M. Y. Siyal. A Secure and Robust Dct-based Hashing Scheme for Image Authentication[C]//10th IEEE Singapore International Conference on Communication systems. ICCS 2006. 2006:1–6.
    24 Y. Shih-Hsuan, C. Chin-Feng. Robust Image Hashing Based on Spiht[C]//C. Chin-Feng. Information Technology: Research and Education, 2005. ITRE 2005. 3rd International Conference on. 2005:110–114.
    25 V. Monga, M. K. Mihcak. Robust Image Hashing via Non-negative Matrix Factorizations[C]//Proceedings. IEEE International Conference on Acoustics, Speech and Signal Processing. ICASSP. 2006, 2:II–II.
    26 C. D. Roover, C. D. Vleeschouwer, F. Lefebvre, et al. Robust Image Hashing Based on Radial Variance of Pixels[C]//C. D. Vleeschouwer. IEEE International Conference on Image Processing. ICIP 2005. 2005, 3:III–77–80.
    27 J. Fridrich, M. Goljan. Robust Hash Functions for Digital Watermarking[C]//M.Goljan. Proceedings. International Conference on Information Technology: Coding and Computing. 2000:178–183.
    28 F. Ahmed, M. Y. Siyal. A Secure and Robust Hashing Scheme for Image Authentication[C]//M. Y. Siyal. Fifth International Conference on Information, Communications and Signal Processing. 2005:705–709.
    29 Y. Longjiang, S. Shenghe. Image Robust Hashing Based on Dct Sign[C]//IIH-MSP’06. International Conference on Intelligent Information Hiding and Multimedia Signal Processing. 2006:131–134.
    30 S. Ababneh, R. Ansari, A. Khokhar. Scalable Multimedia-content Integrity Verification with Robust Hashing[C]//IEEE International Conference on Electro/Information Technology. EIT. 2008:263–266.
    31 RIAA, IFPI. Request for Information on Audio Fingerprinting Technologies[R]. Tech. rep., Recording Industry Association of America (RIAA) and International Federation of the Phonographic Industry (IFPI), 2001. http://www.riaa.org/pdf/RIAA/ IFPI/Fingerprinting/ RFI.pdf.
    32 P. Cano, E. Batlle, E. Gomez. Audio Fingerprinting: Concepts and Applications[C]//1st International Conference on Fuzzy Systems and Knowledge Discovery. Singapore, 2002.
    33 P. Cano, E. Batlle, E. Gomez, et al. Audio Fingerprinting: Concepts and Applications[M]//Studies in Computational Intelligence. Berlin / Heidelberg: Springer,2005, vol. Volume 2/2005:233–245.
    34 J. S. Seo, J. Haitsma, T. Kalker, et al. A Robust Image Fingerprinting System Using the Radon Transform[J]. Signal Processing: Image Communication, 2004,19:325–339.
    35 F. Mapelli, R. Pezzano, R. Lancini. Robust Audio Fingerprinting for Song Identification, 2004.
    36 M. Mohri, P. Moreno, E. Weinstein. Robust Music Identification, Detection, and Analysis, 2007.
    37 J. S. Seo, J. Haitsma, T. Kalker, et al. A Robust Image Fingerprinting System Using the Radon Transform[J]. Signal Processing: Image Communication, 2004,19:325–339.
    38 J. Haitsma, T. Kalker. A Highly Robust Audio Fingerprinting System[C]//3rd International Conference on Music Information Retrieval, ISMIR. Paris,France,2002.
    39 P. Cano, E. Batle, T. Kalker, et al. A Review of Algorithms for Audio Fingerprinting[C]//E. Batle. 2002 IEEE Workshop on Multimedia Signal Processing.2002:169–173.
    40 Wikipedia. Acoustic Fingerprint. http://en.wikipedia.org/wiki/Acoustic fingerprint.
    41牛夏牧.数字水印处理算法及测试技术[D].哈尔滨工业大学博士论文, 2000.
    42牛夏牧,焦玉华.感知哈希综述[J].电子学报, 2008, 36(7):1405–1411.
    43焦玉华.音频感知哈希算法研究[D].哈尔滨工业大学博士论文, 2009.
    44 M. K. Mihcak, R. Venkatesan. New iterative geometric methods for robust perceptual image hashing [C] // ACM Workshop on Security and Privacy in Digital Rights Management, 2001, Philadephia, PA:13-21
    45吴頔.基于感知不变特征的媒体认证技术研究[D].哈尔滨工业大学博士论文, 2009.
    46 Y. Jiao, L. Ji, X. Niu. Robust Speech Hashing for Content Authentication[J]. IEEE Signal Processing Letters, 2009, 16(9):818-821
    47 R. Lancini, F. Mapelli, R. Pezzano. Audio Content Identification by Using Perceptual Hashing[C]//Proceedings of IEEE International Conference on Multimedia and Expo(ICME’04). Taipei, 2004:739– 742.
    48 F. Mapelli, R. Lancini. Audio Hashing Technique for Automatic Song Identification[C]//Proceedings of ITRE International Conference on Information Technology: Research and Education. Newark, USA, 003:84– 88.
    49 C. Lin, S. Chang. Robust Digital Signature for Multimedia Authentication[J]. IEEE circuits and systems magazine, 2003, 3(4):23-26.
    50 H. Zhang, C. Yang, X. Quan. Image Authentication Based on Digital Siganature and Semi-fragile Watermarking[J]. Journal of computer science and technology, 2004, 19(6).
    51刘彤,裘正定.多媒体认证技术的回顾与展望[J].计算机应用研究, 2002, 19(5).
    52沃焱,韩国强.一种新的基于特征的图像内容认证方法[J].计算机学报, 2005, 28(1).
    53 Q. Li, J. Wu, X. He. Content Based Audio Retrieval Using Perceptual Hash[C]//Proceedings of IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Harbin, China, 2008:791– 794.
    54 S. S. Jin, J. Haitsma, T. Kalker, et al. A robust image fingerprinting system using the Radon transform[J]. Signal Processing and Image Communication, 2004, 19(4):325-339.
    55 M. Schneider, S. Chang. A Robust Content Based Digital Signature for Image Authentication[C]//Proceedings of IEEE International Conference on Image Processing (ICIP'96). Lausanne, Switzerland, 1996, 3:227-230.
    56 F. Bartolini, A. Tefas, M. Barni, et al. Image Authentication Techniques for Surveillance Applications[J]. Proceedings of the IEEE, 2001, 89(10):1403–1418.
    57 W. C. Wah. On the Design of Content-based Multimedia Authentication Systems[J]. IEEE Transactions on Multimedia, 2002, 4(3):385–393.
    58 J. Fridrich. Robust Bit Extraction from Images[C]//IEEE International Conference on Multimedia Computing and Systems. 1999, 2:536–540.
    59 T. Kalker, J. Haitsma, J. C. Oostveen. Issues with Digital Watermarking and Perceptual Hashing[C]//Multimedia Systems and Applications IV. Denver, CO, USA: SPIE, 2001, 4518:189–197.
    60 F. Khelifi, J. Jiang. Perceptual Image Hashing Based on Virtual Watermark Detection[J]. IEEE Transactions on Image Processing, 2010, 19(4):981– 994.
    61 A. Koz, R. L. Lagendijk. Perceptual Video Hashing in P2P Networks[C]//IEEE International Conference on Acoustics Speech and Signal Processing. ICASSP 2010. 2010: 1842 - 1845
    62 B. Coskun, B. Sankur, N. Memon. Spatio–Temporal Transform Based Video Hashing[J]. IEEE Transactions on Multimedia, 2006, 8(6):1190– 1208.
    63 M. Jin, C. D. Yoo. Quantum Hashing for Multimedia[J]. IEEE Transactions on Information Forensics and Security, 2009, 4(4):982– 994.
    64 M. Tagliasacchi, G. Valenzise, S. Tubaro. Hash-Based Identification of Sparse Image Tampering[J]. IEEE Transactions on Image Processing, 2009, 18(11):2491– 2504.
    65 S. Roy, Q. Sun. Robust Hash for Detecting and Localizing Image Tampering[C]// IEEE International Conference on Image Processing. ICIP 2007. 2007, 6: VI-117-VI-120.
    66 V. Monga, A. Banerjee, B. L. Evans. A Clustering Based Approach to Perceptual Image Hashing[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(1):68– 79.
    67 Y Jiao, L. Ji, X. Niu. Robust Speech Hashing for Content Authentication[J]. IEEE Signal Processing Letters, 2009, 16(9):818– 821.
    68 C.-S. Lu, S.-W. Sun, C.-Y. Hsu, P.-C. Chang. Media Hash-dependent Image Watermarking Resilient Against Both Geometric Attacks and Estimation Attacks Based on False Positive-oriented Detection[J]. IEEE Transactions on Multimedia, 2006, 8(4):668– 685.
    69 A. Swaminathan, Y. Mao, M. Wu. Robust and secure image hashing[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(2):215– 230.
    70 Q. Sun, D. He, Q. Tian. A Secure and Robust Authentication Scheme for Video Transcoding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(10):1232– 1244.
    71 Y. Mao, M. Wu. Unicity Distance of Robust Image Hashing[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3):462 - 467.
    72 A. Qamra, Y. Meng, E. Y. Chang. Enhanced Perceptual Distance Functions and Indexing for Image Replica Recognition[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2005, 27(3):379– 391.
    73 Al-Mouhamed, M.; A robust gross-to-fine pattern recognition system . Industrial Electronics, IEEE Transactions on Volume: 48 , Issue: 6. Publication Year: 2001 , Page(s): 1226 - 1237
    74 T. Takeguchi, S. Kaneko. Using Depth Aspect Images for Robust and Efficient Search of Multiple Objects in Optomechatronic Sensing[J]. IEEE Transactions on Industrial Electronics, 2005, 52(4):1041– 1049.
    75 J.-C. Birget, D. Hong, N. Memon. Graphical Passwords Based on Robust Discretization[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(3):395-399.
    76 F. Khelifi, J. Jiang. Analysis of the Security of Perceptual Image Hashing Based on Non-Negative Matrix Factorization[J]. IEEE Signal Processing Letters, 2010, 17(1):43– 46.
    77 X. Lv, Z. J. Wang. Reduced-reference Image Quality Assessment Based on Perceptual Image Hashing[C]//IEEE International Conference on Image Processing. ICIP2009. 2009:4361-4364.
    78 S. Lee, C. D. Yoo. Robust Video Fingerprinting for Content-Based Video Identification[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2008, 18(7):983– 988.
    79 V. Monga, M. K. Mhcak. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3):376– 390.
    80 S. M. Das, H. Pucha, Y. C. Hu. Distributed Hashing for Scalable Multicast in Wireless Ad Hoc Networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2008, 19(3):347– 362.
    81 E. Martinian, G. W. Wornell, B. Chen. Authentication with Distortion Criteria[J]. IEEE Transactions on Information Theory, 2005, 51(7):2523– 2542.
    82 G. Valenzise, M. Tagliasacchi, S. Tubaro, et al. A Compressive-sensing Based Watermarking Scheme for Sparse Image Tampering Identification[C]//IEEE International Conference on Image Processing. ICIP2009. 2009:1265-1268.
    83 J. Ben-Arie, Z. Wang, P. Pandit, S. Rajaram. Human Activity Recognition Using Multidimensional Indexing[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2002, 24(8):1091– 1104.
    84 H. Luo, Y. Qin, H. Zhang. A DHT-Based Identifier-to-Locator Mapping Approach for a Scalable Internet[J]. IEEE Transactions on Parallel and Distributed Systems, 2009, 20(12):1790– 1802.
    85 C. Zhang, L. L. Cheng, Z. Qiu, L. M. Cheng. Multipurpose Watermarking Based on Multiscale Curvelet Transform[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(4):611– 619.
    86 X. Wang, L. Zhang, X. Li, W. Ma. Annotating Images by Mining Image Search Results[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008, 30(11):1919– 1932.
    87 C.-Y. Chiu, H.-M. Wang. Time-series Linear Search for Video Copies Based on Compact Signature Manipulation and Containment Relation Modeling[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2010:1 - 11.
    88 M. P. Queluz. Authentication of Digital Images and Video: Generic Models and a New Contribution[J]. Signal Processing: Image Communication, 2001, 16(5):461-475.
    89 C.-Y. Lin, S.-F. Chang. A Robust Image Authentication Method Surviving JPEG Lossy Compression[C]//Proceedings of IS and T/SPIE symposium on Electronic Imaging Science and Technique. (EI'98)-SPIE Storage and Retrieval of Image/Video Database, San Jose, 1998.
    90 C.-Y. Lin, S.-F. Chang. Generating Robust Digital Signature for Image/VideoAuthentication[C]//Proceedings of ACM Workshop on Multimedia and Security. 1998.
    91 C.-Y. Lin, S.-F. Chang. A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation[J]. IEEE Transaction on Circuits and Systems for Video Technology, 2001, 11(2):153-168.
    92 C.-S. Lu, H.-Y. M. Liao. Structural Digital Signature for Image Authentication: an Incidental Distortion Resistant Scheme[C]//Proceedings of ACM Multimedia and Security Workshop at the 8th ACM Int. Conf. on Multimedia. Los Angeles. California. USA. 2000:115-118.
    93 C.-S. Lu, H.-Y. M. Liao. Structual Digital Signature for Image Authentication: an Incidental Distortion Resistant Scheme[J]. IEEE Transaction on Multimedia, 2003, 5(2):161-173.
    94 S. Bhattacharjee, M. Kutter. Compression Tolerant Image Authentication[C]//Proceedings of IEEE International Conference on Image Processing. ICIP'98. Chicago, IL. 1998, 1:435-439.
    95姚作樑.可自恢复的数字图像认证研究[D].中国人民解放军国防科学技术大学硕士论文, 2002.
    96 J. Cannons, P. Moulin. Design and statiscal analysis of a hash-aided image watermarking system [J]. IEEE Trans. on Image Processing, 2004, 13(10): 1393-1408.
    97 B. B. Zhu, M. D. Swanson, A. H. Tewfik. When Seeing Isn’t Believing [multimedia Authentication Technologies][J]. Signal Processing Magazine, IEEE, 2004, 21(2):40–49.
    98 X. Zhou. Video Fingerprinting Algorithm[D]Darmstadt University of Technology, 2005.
    99 E. Y. Chang, J. Z. Wang, C. Li, et al. Rime: A Replicated Image Detector for the World-wide Web[C]//Proc. of SPIE Symposium of Voice, Video, and Data Communications. 1998:58–67.
    100 C.-S. Lu, C.-Y. Hsu, S.-W. Sun, et al. Robust Mesh-based Hashing for Copy Detection and Tracing of Images[C]//IEEE International Conference on Multimedia and Expo. ICME’04. 2004, 1:731–734 Vol.1.
    101叶卫国,韩水华.基于内容的图像Hash算法及其性能评估[J].东南大学学报, 2007, Vol. 37, Sup(I): 109-113.
    102 C.-Y. Hsu, C.-S. Lu. Robust Image Hashing for Searching Illegal Copies, 2006.
    103 C. van den Branden Lambrecht, O. Verscheure. Perceptual Quality Measure Using a Spatio-temporal Model of the Human Visual System[C]//SPIE: 1996.
    104 B. W. Andrew. Dct Quantization Matrices Visually Optimized for Individual Images[C]//SPIE, 1993, 1913:202–216.
    105 A. B. Watson. Dctune: A Technique for Visual Optimization of Dct Quantization Matrices for Individual Images[C]//Proceedings of SID International Symposium Digest. Plava, Delreg., 1993, 24:946–949.
    106 J. D. Scott. Visible Differences Predictor: An Algorithm for the Assessment of Image Fidelity[C]//SPIE, 1992, 1666:2–15.
    107 M. Miyahara, K. Kotani, V. R. Algazi. Objective Picture Quality Scale (pqs) for Image Coding[J]. Communications, IEEE Transactions on, 1998, 46(9):1215–1226.
    108 H. R. Sheikh, M. F. Sabir, A. C. Bovik. A Statistical Evaluation of Recent Full Reference Image Quality Assessment Algorithms[J]. IEEE Transactions on Image Processing, 2006, 15(11):3440–3451.
    109 W. B. Pennebaker, J. L. Mitchell. JPEG still image data compression standard[M]. 3ed., Springer, 1993.
    110 D. Taubman, M. Marcellin. JPEG2000: Image Compression Fundamentals, Standards and Practice[M]. Kluwer Academic Publishers, 2004.
    111 S. Tang, J.-T. Li, Y.-D. Zhang. SSF Fingerprint for Image Authentication: An Incidental Distortion Resistant Scheme[C]//Proc. ACM Int. Conf. Multimedia. ACMMM'05. Singapore, 2005:523-526.
    112魏崇奎.基于HVS图像质量评价模型的方法研究[D].国防科学技术大学硕士论文, 2003.
    113 A. D. Angelis, A. Moschitta, F. Russo, et al. Image Quality Assessment: An Overview and some Metrological Considerations[C]//A. Moschitta. 2007 IEEE International Workshop on Advanced Methods for Uncertainty Estimation in Measurement. 2007:47–52.
    114韩琦.基于感知内容的人脸图像认证技术研究[D].哈尔滨工业大学博士论文, 2009.
    115潘良刚.基于人类视觉系统的小波域自适应图像水印算法研究[D].华中师范大学硕士论文, 2008.
    116 E. Peli. Test of a model of foveal vision by using simulations[J]. Journal of the Optical Society of America, 1996, 13(6):1131-1138.
    117 S. Winkler. Vision Models and Quality Metrics for Image Processing applications[D]. Diplom-Ingenieur der Elektrotechnik, Technische Universit?t Wien de nationalitéautrichienne, 2000.
    118张素娟.数字图像水印技术的研究[D].北京工业大学硕士学位论文, 2000.
    119李言俊,张科.视觉仿生成像制导技术及应用[M].北京:国防工业出版社,2006.
    120 J. Yang, M. H. Lee, X. H. Chen. Mixing Chaotic Watermarks for Embedding in Wavelet Transform Domain[C]//IEEE International Symposium on Circuits and Systems. 2002, 2: 668-671.
    121 F. X. J. Lukas, Z. L. Budrikis. Picture Quality Prediction Based on a Visual Model[J]. IEEE Transaction on Communication, 1982, vol. COM-30:1679-1693.
    122 C. Zetzsche, G. Hauske. Multiple Channel Model for the Prediction of Subjective Image Quality[C]//SPIE conference on Human Vision, Visual Processing, and Digital Display. 1989, 1077:209-216.
    123 B. G. Breitmeyer, H. ??men. Visual Masking: Time Slices Through Conscious and Unconscious Vision[M]. Oxford: Oxford University Press, 2006.
    124 A. Nillnb. Visual Model Weighted Cosine Transform for Image Compression and Quality Assessment[J]. IEEE Transactions on Communications, 1995, 33(6):551-557.
    125 B. W. Andrew. The Cortex Transform: Rapid Computation of Simulated Neural Images[J]. Comput. Vision Graph. Image Process., 1987, 39(3):311–327.
    126 C.-H. Chou, Y.-C. Li.A Perceptually Tuned Subband Image Coder Based on the Measure of Just-Noticeable-Distortion Profile[J]. IEEE Transaction on Circuits and Systems for Video Technology, 1995, 5(6): 467-476.
    127 W. Zhou, A. C. Bovik, H. R. Sheikh, et al. Image Quality Assessment: From Error Visibility to Structural Similarity[J]. IEEE Transactions on Image Processing,2004, 13(4):600–612.
    128 W. Zhou, A. C. Bovik. A Universal Image Quality Index[J]. Signal Processing Letters, IEEE, 2002, 9(3):81–84.
    129 H. R. Sheikh, A. C. Bovik. Image Information and Visual Quality[J]. IEEE Transactions on Image Processing, 2006, 15(2):430–444.
    130林春漪,尹俊勋,高学,等.基于统计学习的多层医学图像语义建模方法[J].深圳大学学报理工版,2007,24(2):138—143.
    131 Z. Wang, A. C. Bovik, H. R. Sheikh, et a1. LIVE image quality assessmentdatabase release 2[DB/OL],2007. http://live.ece.utexas.edu/research/quality/.
    132 J. G. Daugman. Uncertainty Relation for Resolution in Space, Spatial Frequency, and Orientation Optimized by Two-dimensional Visual Cortical Filters[J]. Journal of the Optical Society of America, A, 1985, 2(7):1160–1169.
    133 J. G. Daugman. Complete Discrete 2-D Gabor Transforms by Neural Networks for Image Analysis and Compression[J]. IEEE Transactions on Acoustics, Speech and Signal Processing, 1988, 36(7):1169–1179.
    134 G. C. DeAngelis, I. Ohzawa, R. D. Freeman. Receptive-field Dynamics in the Central Visual Pathways[J]. Trends Neurosci, 1995, 18:451–458.
    135 N. Petkov. Biologically Motivated Computationally Intensive Approaches to Image Pattern Recognition[J]. Future Generation Computer Systems, 1995, 11:451-465.
    136 J. P. Jones, L. A. Palmer. An Evaluation of the Two-dimensional Gabor Filter Model of Simple Receptive Fields in Cat Striate Cortex[J]. Journal of Neurophysiol, 1987, 58:1233-1258.
    137 B. S. Manjunath, C. Shekhar, R. Chellappa. A New Approach to Image Feature Detection with Applications[J]. Pattern Recognition, 1996(4): 1-26.
    138 H. Zhang, Y. Wang, X. Niu. A Cyclic Coding Based Perceptual Hashing Algorithm[C]//International Conference on Intelligent Systems Design and Applications, 2008.
    139 R. Lakkundi. JPEG Codec. Matlab Central, 2006. http://www.mathworks.com/matlabcentral/fileexchange/10476.
    140 B. Coskun, B. Sankur, N. Memon. Spatio–Temporal Transform Based Video Hashing[J]. IEEE Transactions on Multimedia, 2006, 8(6):1190 - 1208.
    141 Z. Wei, K. N. Ngan. Spatio-Temporal Just Noticeable Distortion Profile for Grey Scale Image/Video in DCT Domain[J]. IEEE Transaction on Circuits and Systems for Video Technology 2009, 19(3):337-346.
    142 R. R. Korfhage, Information Storage and Retrieval[M]. Hoboken, NJ: Wiley, 1997.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700