Laser & Optoelectronics Progress, Volume. 54, Issue 2, 21004(2017)

Image Hash Algorithm Based on Data Dimension Reduction and Symmetric Binary Pattern

Wang Yanchao1、*, Guo Jingbo1, and Zhou Liyan2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    References(17)

    [1] [1] Lin Chao, Shen Xueju, Lei Ming, et al. Optical security validation based on orthogonal polarization multiplexing in three-dimensional space[J]. Acta Optica Sinica, 2016, 36(3): 0307001.

    [2] [2] Oommen R S, Jayamohan M, Sruthy S. Using fractal dimension and singular values for image forgery detection and localization [J]. Procedia Technology, 2016, 24: 1452-1459.

    [3] [3] Liu Z, Li Q, Niu X. Improve the security of image robust hash using fuzzy commitment scheme[J]. Neural Computing and Applications, 2013, 23(1): 67-72.

    [4] [4] Li Xinwei, Li Leida. Robust image hashing algorithm based on polar harmonic transform[J].Computer Simulation, 2014, 31(5): 293-296.

    [5] [5] Choi Y S, Park J H. Image hash generation method using hierarchical histogram[J]. Multimedia Tools and Applications, 2012, 61(1): 181-194.

    [6] [6] Zeng Yong, Sun Shusen, Xia Aijun. Image perceptual hashing based on image normalization and DCT[J]. Journal of Zhejiang Sci-Tech University, 2012, 29(1): 84-88.

    [7] [7] Sun R, Zeng W. Secure and robust image hashing via compressive sensing[J]. Multimedia Tools and Applications, 2014, 70(3): 1651-1665.

    [8] [8] Cheng Xiangzheng, Zeng Chaoyang, Chen Hang, et al. Calibration method of low-resolution sensor based on bilinear interpolation strategy[J]. Laser & Optoelectronics Progress, 2013, 50(7): 071501.

    [9] [9] Fang Wangsheng, Li Yunan, Zhang Rong. Blind watermarking algorithm for color image guided by visual model[J]. Application Research of Computers, 2011, 28(7): 2719-2722.

    [10] [10] Zhang Z, Chen J, Li X, et al. An image matching method based on Fourier and LOG-polar transform[J]. Sensors & Transducers, 2014, 169(4): 61-66.

    [12] [12] Tiwari D, Tyagi V. A novel scheme based on local binary pattern for dynamic texture recognition[J]. Computer Vision and Image Understanding, 2016, 150: 58-65.

    [13] [13] Zhang Zhifeng, Pei Zhili. Image forgery detection based on fuzzy local binary pattern operator[J].Computer Engineering and Design, 2015, 36(12): 3284-3290.

    [14] [14] Brinkhuis J, Protasov V. A new proof of the Lagrange multiplier rule[J]. Operations Research Letters, 2016, 44(3): 400-402.

    [15] [15] Zhao Xin. Research on the optimization performance comparison of different one-dimensional chaotic maps[J]. Computer Application of Research, 2012, 29(3): 913-915.

    [16] [16] Schaefer G, Stich M. UCID-an uncompressed colour image database[C]. SPIE, 2004, 5307: 472-480.

    [17] [17] Tang Z, Zhang X, Zhang S. Robust perceptual image hashing based on ring partition and nonnegative matrix factorization[J]. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(3): 711-724.

    CLP Journals

    [1] [in Chinese], [in Chinese]. A Robust Compact Image Hash Algorithm Zhang Zhifeng, Pei Zhili[J]. Laser & Optoelectronics Progress, 2017, 54(10): 101002

    [2] Peng Yanfei, Wu Hong, Zi Lingling. Image Retrieval Based on Hash Method and Generative Adversarial Networks[J]. Laser & Optoelectronics Progress, 2018, 55(10): 101002

    Tools

    Get Citation

    Copy Citation Text

    Wang Yanchao, Guo Jingbo, Zhou Liyan. Image Hash Algorithm Based on Data Dimension Reduction and Symmetric Binary Pattern[J]. Laser & Optoelectronics Progress, 2017, 54(2): 21004

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Image Processing

    Received: Sep. 22, 2016

    Accepted: --

    Published Online: Feb. 10, 2017

    The Author Email: Wang Yanchao (WangYchao1975pds@163.com)

    DOI:10.3788/lop54.021004

    Topics