4.6 Article

Robust Hashing Based on Quaternion Zernike Moments for Image Authentication

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/2978572

关键词

Robust image hashing; quaternion Zernike moments; multimedia authentication; image forensics

资金

  1. National Natural Science Foundation of China [61272063, 61202111, 61572187]
  2. China Science and Technology Pillar Program [2015BAF32B01]
  3. Research Fund for the Hunan Provincial Natural Science Foundation of china [2015JJ2056]
  4. Hunan Provincial University Innovation Platform Open Fund Project of China [14K037]

向作者/读者索取更多资源

The reliability and security of multimedia contents in transmission, communications, storage, and usage have attracted special attention. Robust image hashing, also referred to as perceptual image hashing, is widely applied in multimedia authentication and forensics, image retrieval, image indexing, and digital image watermarking. In this work, a novel robust image hashing method based on quaternion Zernike moments (QZMs) is proposed. QZMs offer a sound way to jointly deal with the three channels of color images without discarding chrominance information; the generated hash is thus shorter than the hash of three channels separately processing. The proposed approach's performance was evaluated on the color images database of UCID and compared with several recent and efficient methods. These experiments show that the proposed scheme provides a short hash in length that is robust to most common image content-preserving manipulations like JPEG compression, filtering, noise, scaling, and large angle rotation operations.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Engineering, Electrical & Electronic

A Many-Objective Optimization Based Intelligent Intrusion Detection Algorithm for Enhancing Security of Vehicular Networks in 6G

Zhixia Zhang, Yang Cao, Zhihua Cui, Wensheng Zhang, Jinjun Chen

Summary: A novel weight-based ensemble machine learning algorithm was designed to identify abnormal messages in vehicular Controller Area Network (CAN) bus network, along with a model based on many-objective optimization for intrusion detection. Experimental results showed significant improvements in security and performance.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Computer Science, Information Systems

A New Subspace Clustering Strategy for AI-Based Data Analysis in IoT System

Zhihua Cui, Xuechun Jing, Peng Zhao, Wensheng Zhang, Jinjun Chen

Summary: This study proposes a post-processing strategy for subspace clustering of hyperspectral image data to balance sparsity and connectivity, and experimental results demonstrate its effectiveness in improving clustering accuracy in the Internet of Things.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

A Multicloud-Model-Based Many-Objective Intelligent Algorithm for Efficient Task Scheduling in Internet of Things

Xingjuan Cai, Shaojin Geng, Di Wu, Jianghui Cai, Jinjun Chen

Summary: The rapid development of IoT leads to unprecedented data demand and security challenges. Multicloud platform, as a high-performance secure computing platform, can address data processing and security issues to some extent.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Theory & Methods

A Survey on Differential Privacy for Unstructured Data Content

Ying Zhao, Jinjun Chen

Summary: This article summarizes and analyzes the application of differential privacy solutions in protecting unstructured data, including various privacy models and mechanisms, as well as the challenges they face. It also discusses the privacy guarantees of these methods against AI attacks and utility losses, and proposes several possible directions for future research.

ACM COMPUTING SURVEYS (2022)

Article Computer Science, Artificial Intelligence

A Many-Objective Multistage Optimization-Based Fuzzy Decision-Making Model for Coal Production Prediction

Xingjuan Cai, Jiangjiang Zhang, Zhenhu Ning, Zhihua Cui, Jinjun Chen

Summary: The article presents an improved many-objective fuzzy decision-making model with human participation for coal production prediction, including five objective functions, and a novel multistage many-objective optimization algorithm to adjust relevant model parameters. The algorithm involves three stages of optimization and aims to achieve a balance of convergence and diversity during population evolution. Results show that the proposed optimization algorithm outperforms other advanced many-objective algorithms in terms of convergence and diversity for coal fuzzy decision-making problems.

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2021)

Article Automation & Control Systems

A Sharding Scheme-Based Many-Objective Optimization Algorithm for Enhancing Security in Blockchain-Enabled Industrial Internet of Things

Xingjuan Cai, Shaojin Geng, Jingbo Zhang, Di Wu, Zhihua Cui, Wensheng Zhang, Jinjun Chen

Summary: The industrial Internet of Things relies on large amounts of data for efficient control of the physical world, but faces challenges in data security. Blockchain technology can support data security and privacy preservation, while sharding technology can improve network throughput and scalability. However, the effectiveness of sharding is still challenging.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

A Numerical Splitting and Adaptive Privacy Budget-Allocation-Based LDP Mechanism for Privacy Preservation in Blockchain-Powered IoT

Kai Zhang, Jiao Tian, Hongwang Xiao, Ying Zhao, Wenyu Zhao, Jinjun Chen

Summary: Blockchain has attracted attention from the IoT research community due to its decentralization and consistency. However, the accessibility of all nodes to the chain data raises privacy concerns. To address this issue, we propose a novel LDP mechanism that splits and perturbs input numerical data using digital bits, without requiring a fixed input range and large data volume. Our adaptive privacy budget allocation model significantly reduces the deviation of the perturbation function and provides high data utility while maintaining privacy.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Immunology

Interleukin-18 Inhibition Protects Against Intervertebral Disc Degeneration via the Inactivation of Caspase-3/9 Dependent Apoptotic Pathways

Kai Zhang, Lei Gao, Hai-xu Wang, Lei Ye, Yan-yan Shi, Wu-yan Yang, Ya-nan Li, Yan Li

Summary: The study found that IL-18 expression levels were significantly increased in NP tissues of both IVDD patients and mouse models. Treatment with Ad-sh-IL-18 reversed IVDD progression in mice models and increased levels of Aggrecan and Collagen II in NP cells. Ad-sh-IL-18 was also found to inhibit NP cell apoptosis by regulating the caspase-3/9 pathway.

IMMUNOLOGICAL INVESTIGATIONS (2022)

Article Automation & Control Systems

Privacy Preserving High-Order Bi-Lanczos in Cloud-Fog Computing for Industrial Applications

Jun Feng, Laurence T. Yang, Ronghao Zhang, Weizhong Qiang, Jinjun Chen

Summary: In this article, a novel privacy preserving HOBI-Lanczos approach using tensor train in cloud-fog computing is proposed for industrial data applications. The proposed approach allows for secure industrial data analysis without compromising users' privacy, and its superiority is demonstrated through experiments.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

A semi-fragile watermarking tamper localization method based on QDFT and multi-view fusion

Junlin Ouyang, Jingtao Huang, Xingzi Wen, Zhuhong Shao

Summary: This paper proposes a semi-fragile watermarking tamper localization method based on quaternion discrete Fourier transform (QDFT) and multi-view fusion. The method embeds two watermarks in the QDFT domain to improve resistance to geometric attacks and integrity protection of host images. By using global information and local smoothing cues, multi-scale candidate maps with real values are obtained instead of binary maps. Local adaptive fusion is then performed to obtain a consistent single tampering map. Experimental results show that the proposed method provides better resistance to signal processing attacks and improves the F-measure value of tamper localization compared to state-of-the-art methods.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Engineering, Multidisciplinary

A Many-Objective Optimization Based Intelligent High Performance Data Processing Model for Cyber-Physical-Social Systems

Zhihua Cui, Zhixia Zhang, Zhaoming Hu, Shaojin Geng, Jinjun Chen

Summary: Cyber-Physical Social System (CPSS) is an emerging paradigm that offers efficient, convenient, and personalized services to humans. However, the explosive growth of user data has made dealing with massive and high-dimensional data a significant challenge for CPSS services. This paper addresses the issue of redundant attributes in high-dimensional data by optimizing the vision model using intelligent optimization technology. A collaboration mechanism (MaOEA-CM) is designed to support the model. Experimental results demonstrate that the proposed algorithm and model greatly improve the accuracy of data processing in CPSS.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Computer Science, Information Systems

Anomaly Detection in Blockchain Networks: A Comprehensive Survey

Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

Summary: Over the past decade, blockchain technology has gained significant attention due to its integration with various everyday applications of modern information and communication technologies (ICT). The peer-to-peer (P2P) architecture of blockchain enhances these applications by providing strong security and trust-oriented guarantees. However, recent research has shown that blockchain networks may still face security, privacy, and reliability issues. In this article, we provide a comprehensive survey on the integration of anomaly detection models in blockchain technology. We discuss the role of anomaly detection in ensuring security, present evaluation metrics and requirements, survey various models, and highlight future research directions.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2023)

Article Computer Science, Artificial Intelligence

Geo-Ellipse-Indistinguishability: Community-Aware Location Privacy Protection for Directional Distribution

Ying Zhao, Dong Yuan, Jia Tina Du, Jinjun Chen

Summary: Directional distribution analysis is essential for abstracting dispersion and orientation of spatial datasets, but it must be used cautiously to protect individuals' privacy. There is a tension between accurate directional distribution results and location privacy. In this paper, we propose a geo-ellipse-indistinguishability privacy notion to protect individual location data and present elliptical privacy mechanisms based on gamma distribution and multivariate normal distribution. The empirical evaluation shows that our proposed elliptical approach achieves significantly higher directional distribution utility compared to circular noise function based methods.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2023)

Article Computer Science, Cybernetics

A Knowledge Graph-Based Many-Objective Model for Explainable Social Recommendation

Xingjuan Cai, Wanwan Guo, Mengkai Zhao, Zhihua Cui, Jinjun Chen

Summary: This article proposes a knowledge graph-based many-objective model for explainable social recommendation (KGMESR), which considers the explainability, accuracy, novelty, and content quality of social recommendation results. The model utilizes social behavior information to calculate user similarity and quantifies the explainability of results using entity vectors and embedding vectors. A many-objective recommendation algorithm based on the partition deletion strategy is designed for efficiency. Experimental results demonstrate preferable recommendation results and two case studies affirm the explainability of the proposed model.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Telecommunications

Optimizing Blockchain Based Smart Grid Auctions: A Green Revolution

Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

Summary: This paper discusses the research on decentralized auctions for energy trading. Blockchain, as a new paradigm, brings both trust and challenges of high computation and communication complexity. There is a need to develop greener and computational-friendly auctions. The paper provides motivation and design requirements for decentralized auctions, and analyzes existing technical works on blockchain-based energy auctions from a green perspective. Finally, challenges and possible future research directions are summarized.

IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING (2022)

暂无数据