浏览全部资源
扫码关注微信
1. 南京师范大学 虚拟地理环境教育部重点实验室,江苏 南京,210023
2. 金陵科技学院,江苏 南京,211169
收稿日期:2016-05-16,
修回日期:2016-06-03,
纸质出版日期:2016-11-14
移动端阅览
王玉海, 朱长青, 苏守宝等. 结合感知哈希与数字水印的遥感影像认证方法[J]. 光学精密工程, 2016,24(10s): 640-648
WANG Yu-hai, ZHU Chang-qing, SU Shou-bao etc. An authentication method based on perceptual hashing and watermarking for remote sensing image[J]. Editorial Office of Optics and Precision Engineering, 2016,24(10s): 640-648
王玉海, 朱长青, 苏守宝等. 结合感知哈希与数字水印的遥感影像认证方法[J]. 光学精密工程, 2016,24(10s): 640-648 DOI: 10.3788/OPE.20162413.0640.
WANG Yu-hai, ZHU Chang-qing, SU Shou-bao etc. An authentication method based on perceptual hashing and watermarking for remote sensing image[J]. Editorial Office of Optics and Precision Engineering, 2016,24(10s): 640-648 DOI: 10.3788/OPE.20162413.0640.
针对遥感影像的完整性认证需求,结合感知哈希与数字水印各自的特点,提出一种基于感知哈希与数字水印的遥感影像认证方法。该方法的关键在于克服感知哈希与数字水印之间的相互影响:首先对影像进行格网划分;然后通过离散小波变换(DWT)提取影像格网单元的水平和垂直中频系数,经过主成分分析(PCA)处理后生成感知哈希序列;接下来,基于“交错”策略,将感知哈希序列嵌入影像。在影像的认证端提取嵌入影像的感知哈希序列,并将其与重建值进行对比,进而实现影像的完整性认证。该方法将感知哈希与数字水印有机结合,克服了感知哈希进行遥感影像认证的过程需要额外传输认证信息的不足。结果表明,篡改测试实例的归一化Hamming距离为0.218 7~0.398 4,能够有效识别恶意篡改,且嵌入哈希序列的格网单元的平均PSNR约为38~39,不影响遥感影像的可用性。
Aiming at the requirements of complete authentication of remote sensing image in application
an authentication method based on perceptual hashing and watermarking for remote sensing image is proposed. The key of the method is to overcome the mutual influence between perceptual hashing and watermarking. Firstly
the remote sensing image is partitioned into girds which are then preprocessed; secondly
horizontal and vertical middle frequency coefficients are extracted by DWT(Discrete Wavelet Transtorm) and treated by PCA(Principal Component Analysis) to generate perceptual hash value
which is embedded into the diagonal middle frequency coefficient based on interleaving strategy. The authentication process is implemented via the comparison between the extracted perceptual hash value and the reconstructed one. As the method organically combined perceptual hashing and watermarking
it overcomes the defect that the perceptual hashing based authentication needs extra channel to transmit hash values. The experiments demonstrate that the Hamming distance of the tampering tests is between 0.218 7 and 0.398 4
thus the detailed tampering of the image can be effectively detected
and the average PSNR of the grids with perceptual hash value embedded is about 38 to 39
which means the availability of the image is not affected.
牛夏牧, 焦玉华. 感知哈希综述[J]. 电子学报, 2008, 36(7):1405-1411. NIU X M, JIAO Y H. An overview of Perceptual Hashing[J].Acta Electronica Sinica, 2008, 36(7):1405-1411. (in Chinese)
丁凯孟, 朱长青, 苏守宝, 等. 用于多光谱影像完整性认证的感知哈希算法[J]. 光学精密工程, 2015,23(10z):676-683. DING K M, ZHU C Q, SU S B.Perceptual hash method for integrity authentication of multispectral remote sensing images[J]. Opt. Precision Eng., 2015,23(10z):676-683. (in Chinese)
王俊文, 刘光杰, 张湛,等. 基于小波变换和Zernike矩的图像区域复制篡改鲁棒取证[J]. 光学精密工程, 2009, 17(7):1686-1693. WANG J W, LIU G J, ZHANG Z, et al.. Robust forensics for image regional duplication and forgery based on DWT and Zernike moment[J].Opt. Precision Eng., 2009, 17(7):1686-1693. (in Chinese)
龚卫国, 张旋, 李正浩. 基于改进局部敏感散列算法的图像配准[J]. 光学精密工程, 2011, 19(6):1375-1383. GONG W G, ZHANG X, LI Z H. Image registration based on extended LSH[J].Opt. Precision Eng., 2011, 19(6):1375-1383. (in Chinese)
丁凯孟, 朱长青. 一种用于遥感影像完整性认证的感知哈希算法[J]. 东南大学学报:自然科学版, 2014, 44(4):723-727. DING K M, ZHU C Q. Perceptual hash method for integrity authentication of remote sensing image[J]. Journal of Southeast University (Natural Science Edition), 2014, 44(4):723-727. (in Chinese)
丁凯孟, 朱长青, 卢付强. 基于自适应格网划分的遥感影像感知哈希认证算法[J]. 武汉大学学报:信息科学版, 2015, 40(6):716-720. DING K, ZHU C Q, LU F. An adaptive grid partition based perceptual hashmethod for remote sensing image authentication[J]. Wuhan Daxue Xuebao, 2015, 40(6). (in Chinese)
SUN R, ZENG W. Secure and robust image hashing via compressive sensing[J]. Multimedia Tools and Applications, 2014, 70(3):1651-1665.
HAN Q, WANG Z, LI Q, et al.. A facial image authentication method by embedding PLT-PCA features[J]. International Journal of Digital Content Technology & Its Applic, 2012, 6(10):266-275.
林丕源, 严尚维. 基于椭圆曲线和信息隐藏的农业信息安全传输方案[J]. 农业工程学报, 2004, 20(4):134-137. LIN P Y, YAN S W. Secure transmission scheme of important agricultural information on networks based on elliptic curve and information hiding[J].Transactions of The Chinese Society of Agricultural Engineering, 2004, 20(4):134-137. (in Chinese)
WENG L, DARAZI R, PRENEEL B, et al.. Robust image content authentication using perceptual hashing and watermarking[J]. Lecture Notes in Computer Science, 2012, 7674:315-326.
ESWARAIAH R, SREENIVASA Reddy E. Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest[J]. Iet Image Processing, 2015, 9(8):615-625.
BABY D, THOMAS J, AUGUSTINE G, et al.. A novel DWT based image securing method using steganography[J]. Procedia Computer Science, 2015, 46:612-618.
王永吉, 吴敬征, 曾海涛,等. 隐蔽信道研究[J]. 软件学报, 2010, 21(9):2262-2288. WANG Y J, WU J J, ZENG H T. Covert Channel Research[J]. Journal of Software, 2010, 21(9):2262-2288. (in Chinese)
王宇. 遥感影像信息隐藏算法研究[D]. 南京师范大学, 2012. WANG Y. Research on Information Hiding for Remote Sensing Image [D]. Nanjing:Nanjing Normal University,20012. (in Chinese)
韩琦. 基于感知内容的人脸图像认证技术研究[D]. 哈尔滨工业大学, 2009. HAH Q. Research on perceptual content based facial image authentication techniques[D]. Harbin:Harbin Institute of Technology,2009. (in Chinese)
BABY D, THOMAS J, AUGUSTINE G, et al.. A novel DWT based image securing method using steganography[J]. Procedia Computer Science, 2015, 46:612-618.
SINGH A K, KUMAR B, DAVE A, et al.. Robust and imperceptible dual watermarking for telemedicine applications[J]. Wireless Personal Communications, 2015, 80(4):1415-1433.
任娜, 朱长青, 王志伟. 基于映射机制的遥感影像盲水印算法[J]. 测绘学报, 2011, 40(5):623-627. REN N, ZHU C Q, WANG ZH W. Blind watermarking method based on mapping mechanism for remote sensing image[J]. Acta Geodaetica et Cartographica Sinica, 2011, 40(5):623-627. (in Chinese)
PARKER J, NUNES E, GODOY J, et al.. Exploiting spatial locality and heterogeneity of agents for search and rescue teamwork[J]. Journal of Field Robotics, 2015.
0
浏览量
535
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构