4.6 Article

Robust image hashing using non-uniform sampling in discrete Fourier domain

期刊

DIGITAL SIGNAL PROCESSING
卷 23, 期 2, 页码 578-585

出版社

ACADEMIC PRESS INC ELSEVIER SCIENCE
DOI: 10.1016/j.dsp.2012.11.002

关键词

Image hashing; Fourier transform; Non-uniform sampling; Robustness; Anti-collision; Security

向作者/读者索取更多资源

This paper proposes a robust image hashing method in discrete Fourier domain that can be applied in such fields as image authentication and retrieval. In the pre-processing stage, image resizing and total variation based filtering are first used to regularize the input image. Then the secondary image is obtained by the rotation projection, and the robust frequency feature is extracted from the secondary image after discrete Fourier transform. More sampling points are chosen from the low- and middle-frequency component to represent the salient content of the image effectively, which is achieved by the non-uniform sampling. Finally, the intermediate sampling feature vectors are scrambled and quantized to produce the resulting binary hash securely. The security of the method depends entirely on the secret key. Experiments are conducted to show that the present method has satisfactory robustness against perceptual content-preserving manipulations and has also very low probability for collision of the hashes of distinct images. (C) 2012 Elsevier Inc. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

JPEG Image Encryption With Adaptive DC Coefficient Prediction and RS Pair Permutation

Chuan Qin, Jinchuan Hu, Fengyong Li, Zhenxing Qian, Xinpeng Zhang

Summary: JPEG image encryption converts the original JPEG image into a noise-like image without any useful information. Existing schemes may not balance file size increment and encryption security. To address this, we propose a novel scheme that predicts DC coefficients and encrypts the histogram of prediction errors, ensuring a small file size increment. We also implement permutation for RS pairs in each DCT block to distort image contents. Extensive experiments demonstrate our scheme's compatibility, small file size increment, and superior security performance compared to existing schemes.

IEEE TRANSACTIONS ON MULTIMEDIA (2023)

Article Computer Science, Information Systems

Reversible data hiding in encrypted images using median prediction and bit plane cycling-XOR

Fengyong Li, Hengjie Zhu, Chuan Qin

Summary: This paper proposes a reversible data hiding scheme in encrypted images by combining median prediction and bit plan cycling-XOR, achieving a better balance among good visual quality, large embedding capacity and high security performance.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Engineering, Electrical & Electronic

A Comprehensive Analysis Method for Reversible Data Hiding in Stream-Cipher-Encrypted Images

Mingji Yu, Heng Yao, Chuan Qin, Xinpeng Zhang

Summary: This paper proposes a novel comprehensive measure to evaluate the performance of stream-cipher-based reversible data hiding algorithms, taking into consideration the influence of encryption schemes. By categorizing the characteristics of encryption and embedding processes, and using correlation, redundancy, embedding rate, computation complexity, visual quality, and algorithm stability as evaluation indexes, this method provides a more reasonable comparison of RDHEI algorithms. The experimental results demonstrate the guiding significance of the proposed method for current RDHEI algorithm selection.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2022)

Article Computer Science, Information Systems

Image Forgery Detection Using Tamper-Guided Dual Self-Attention Network with Multiresolution Hybrid Feature

Fengyong Li, Zhenjia Pei, Weimin Wei, Jing Li, Chuan Qin

Summary: In this study, we propose a method for image forgery detection by fusing multi-resolution features and designing a tamper-guided dual self-attention module. Experimental results demonstrate that compared to existing schemes, our method can achieve pixel-level forgery localization and image-level forgery detection simultaneously, while maintaining higher detection accuracy and stronger robustness.

SECURITY AND COMMUNICATION NETWORKS (2022)

Article Engineering, Electrical & Electronic

JPEG Reversible Data Hiding Using Dynamic Distortion Optimizing With Frequency Priority Reassignment

Fengyong Li, Zhen Qi, Xinpeng Zhang, Chuan Qin

Summary: This article introduces a new JPEG reversible data hiding scheme that improves image quality and reduces file size expansion by optimizing distortion models and reassigning frequency priorities.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2022)

Article Engineering, Electrical & Electronic

Reversible Data Hiding in Palette Images

Mingji Yu, Heng Yao, Chuan Qin, Xinpeng Zhang

Summary: Reversible data hiding (RDH) has been studied for over two decades and can be divided into RDH and reversible data hiding in encrypted images (RDHEI) depending on the application scenario. Most studies have focused on gray-scale images, with relatively few conducted on color images and even fewer on palette images. Therefore, a new framework specifically for palette images is proposed, which includes a route selection algorithm followed by a color table reconstruction. Experimental results demonstrate the improvement brought by this route selection to existing RDH/RDHEI methods in palette images.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2023)

Article Computer Science, Artificial Intelligence

NIM-Nets: Noise-Aware Incomplete Multi-View Learning Networks

Yalan Qin, Chuan Qin, Xinpeng Zhang, Donglian Qi, Guorui Feng

Summary: In this paper, the authors investigate three challenging problems in the field of incomplete multi-view representation learning and propose a novel framework called NIM-Nets to address these challenges. NIM-Nets can fully utilize incomplete data from different views to produce a consistent, informative, and robust multi-view shared representation. The authors also introduce definitions of robustness and completeness for incomplete multi-view representation learning.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2023)

Article Computer Science, Artificial Intelligence

DNN self-embedding watermarking: Towards tampering detection and parameter recovery for deep neural network

Gejian Zhao, Chuan Qin, Heng Yao, Yanfang Han

Summary: This study proposes a novel protection scheme for deep neural network (DNN) models, which utilizes a self-embedding fragile watermark to ensure model integrity and parameter recovery. The experimental results demonstrate that the proposed scheme achieves satisfactory tampering detection and parameter recovery with low device requirements, and it can be effectively applied to various existing DNN models.

PATTERN RECOGNITION LETTERS (2022)

Article Computer Science, Hardware & Architecture

Perceptual Authentication Hashing for Digital Images With Contrastive Unsupervised Learning

Guopeng Gao, Chuan Qin, Yaodong Fang, Yuanding Zhou

Summary: In this work, a new perceptual authentication hashing model for digital images based on contrastive unsupervised learning is proposed. By utilizing a contrastive augmentation structure and an integrated loss function, the proposed scheme achieves robustness to unknown manipulations and outperforms other existing schemes in performance.

IEEE MULTIMEDIA (2023)

Article Engineering, Electrical & Electronic

Reversible Data Hiding in Encrypted Images With Secret Sharing and Hybrid Coding

Chunqiang Yu, Xianquan Zhang, Chuan Qin, Zhenjun Tang

Summary: This study proposes a new reversible data hiding method using Chinese remainder theorem-based secret sharing and hybrid coding, which achieves high embedding capacity and good security properties.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2023)

Article Computer Science, Information Systems

TASTNet: An end-to-end deep fingerprinting net with two-dimensional attention mechanism and spatio-temporal weighted fusion for video content authentication

Gejian Zhao, Fengyong Li, Heng Yao, Chuan Qin

Summary: This paper proposes a robust fingerprinting scheme for video content authentication. It extracts key spatio-temporal features from the input video and maps them to the corresponding fingerprint using a two-dimensional attention mechanism and spatio-temporal weighted fusion. Experimental results show that the proposed scheme achieves superior performances in terms of robustness and discrimination.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2023)

Article Computer Science, Artificial Intelligence

Reversible PRNU anonymity for device privacy protection based on data hiding

Jian Li, Xiaobo Zhang, Bin Ma, Chuan Qin, Chunpeng Wang

Summary: In this paper, a method of protecting a device from being identified through image capture is proposed. This method involves suppressing the device-related fingerprint, PRNU, in an image by modifying it in the domain of integer wavelet transform. The suppressed PRNU is then embedded into the image using reversible data hiding for perfect recovery of the original image. Extensive experiments on MICHE-I and VISION datasets demonstrate that this method addresses the shortcomings of existing techniques and exhibits strong scalability.

EXPERT SYSTEMS WITH APPLICATIONS (2023)

Article Geochemistry & Geophysics

EPFNet: Edge-Prototype Fusion Network Toward Few-Shot Semantic Segmentation for Aerial Remote-Sensing Images

Jiayi Wu, Chuan Qin, Yanli Ren, Guorui Feng

Summary: This study presents a novel semantic segmentation network structure that integrates prototype information with global edge information to achieve more accurate prototype-matching results. In addition, a comprehensive weighted loss function is designed to monitor the training process and help overcome challenges. Results of performance comparison with existing few-shot semantic segmentation methods demonstrate the superiority of the proposed method.

IEEE GEOSCIENCE AND REMOTE SENSING LETTERS (2023)

Article Computer Science, Artificial Intelligence

Robust Image Hashing in Encrypted Domain

Xinran Li, Mengqi Guo, Zichi Wang, Jian Li, Chuan Qin

Summary: This article proposes a powerful image hashing method for encrypted images, which can extract hash sequences from the encrypted version of an image without decryption, to protect the privacy of image content. The method encrypts the plaintext image using the Paillier cryptosystem, and then extracts the hash sequence through Walsh-Hadamard transform and histogram statistics. In the encrypted domain, image owners can efficiently authenticate their images through a cloud server without disclosing the image content. Compared with traditional hashing methods designed for plaintext domain, our method achieves satisfactory privacy-preserving performance and better image authentication performance.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE (2023)

Article Computer Science, Hardware & Architecture

CADW: CGAN-Based Attack on Deep Robust Image Watermarking

Chuan Qin, Shengyan Gao, Xinpeng Zhang, Guorui Feng

Summary: This research designs an effective image watermarking attack method based on the conditional generative adversarial nets (CGAN). It constructs a targeted and combined loss function according to the network structure of CGAN, which can ensure an acceptable visual quality of attacked image and make the watermark extraction fail simultaneously. Experimental results demonstrate the effectiveness of this method for some state-of-the-art deep robust image watermarking methods with transferability. As an attack method, it can serve as an evaluation standard to measure the robustness of watermarking.

IEEE MULTIMEDIA (2023)

Article Engineering, Electrical & Electronic

A novel integrated signal structure of satellite navigation and communication system with plug-and-play capability

Zou Deyue, Gao Siyu, Li Xinyue, Zhao Wanlong

Summary: In this paper, an integrated navigation/communication signal is proposed by combining Cyclic Code Shift Keying (CCSK) as a communication signal with traditional Global Navigation Satellite System (GNSS) signal. A fuzzy judging algorithm and segmenting correlation domain are used to improve the transmission robustness of the integrated signal. Additionally, a strategy is proposed to solve the incompatibility problem between the integrated signal and binary communication system using interleaving coding and dual-thresholds optimization. The proposed algorithm significantly improves the fault-tolerant rate and reduces the Bit Error Rate (BER), enhancing the reliability of the communication system.

DIGITAL SIGNAL PROCESSING (2024)

Article Engineering, Electrical & Electronic

Sub-Nyquist sampling and parameter measurement of LFM-BPSK hybrid modulated signal

Guoxing Huang, Yunfei Xiang, Shibiao Deng, Yu Zhang, Jingwen Wang

Summary: This paper proposes a dual-channel cooperative sub-Nyquist sampling system for LFM-BPSK hybrid modulated signal. The system can solve the frequency ambiguity problem caused by low sampling rate and estimate the phases of binary symbols and the positions of discontinuities through self-mixing technology.

DIGITAL SIGNAL PROCESSING (2024)

Article Engineering, Electrical & Electronic

Optimal location using genetic algorithms for chaotic image steganography technique based on discrete framelet transform

A. Yousefian Darani, Y. Khedmati Yengejeh, G. Navarro, H. Pakmanesh, J. Sharafi

Summary: The development and use of network technology have brought society into the internet world, where communication through digital data takes place. However, the protection of digital resources has become a significant challenge, which steganography is seen as a possible solution for. This paper presents an image steganography algorithm that hides a grayscale secret image within an RGB color cover image, with a genetic algorithm used to optimize the selection of suitable hiding places. The proposed method is empirically demonstrated to be effective in terms of transparency, security, and resistance.

DIGITAL SIGNAL PROCESSING (2024)

Article Engineering, Electrical & Electronic

Gridless sparse recovery STAP algorithm with array amplitude-phase errors for non-uniform linear array

Xiao Tan, Zhiwei Yang, Xianghai Li, Yongfei Mao, Di Jiang

Summary: A novel gridless SR-STAP algorithm applicable to a non-ULA with AAPEs is proposed in this study. By establishing the ANM-STAP model and iteratively updating the clutter subspace and AAPEs, the performance of STAP is improved.

DIGITAL SIGNAL PROCESSING (2024)

Article Engineering, Electrical & Electronic

Efficient physics-based learned reconstruction methods for real-time 3D near-field MIMO radar imaging

Irfan Manisali, Okyanus Oral, Figen S. Oktem

Summary: In this paper, a novel non-iterative deep learning-based reconstruction method for real-time near-field MIMO imaging is proposed. The method achieves high image quality with low computational cost at compressive settings through two stages of processing. A large-scale dataset is also developed for training the neural networks. The effectiveness of the method is demonstrated through experimental data and extensive simulations.

DIGITAL SIGNAL PROCESSING (2024)

Article Engineering, Electrical & Electronic

YOLO-PL: Helmet wearing detection algorithm based on improved YOLOv4

Haibin Li, Dengchao Wu, Wenming Zhang, Cunjun Xiao

Summary: Workplace safety accidents are a pervasive issue worldwide, with 67.95% of construction accidents attributed to the lack of helmet-wearing. Existing helmet detection algorithms suffer from underperformance in real-world scenarios due to various challenges. This study introduces a lightweight helmet detection algorithm, YOLO-PL, which achieves state-of-the-art performance by optimizing network structure and incorporating lightweight modules.

DIGITAL SIGNAL PROCESSING (2024)

Article Engineering, Electrical & Electronic

STP-MFM: Semi-tensor product-based multi-modal factorized multilinear pooling for information fusion in sentiment analysis

Fen Liu, Jianfeng Chen, Kemeng Li, Jisheng Bai, Weijie Tan, Chang Cai, Muhammad Saad Ayub

Summary: In this paper, a semi-tensor product-based multi-modal factorized multilinear (STP-MFM) pooling method is proposed for information fusion in sentiment analysis. Experimental results demonstrate that the proposed method outperforms baselines in terms of accuracy, training speed, and model complexity.

DIGITAL SIGNAL PROCESSING (2024)

Article Engineering, Electrical & Electronic

Contrastive enhancement using latent prototype for few-shot segmentation

Xiaoyu Zhao, Xiaoqian Chen, Zhiqiang Gong, Wen Yao, Yunyang Zhang, Xiaohu Zheng

Summary: In this paper, a contrastive enhancement approach is proposed to mine latent prototypes from background regions and leverage latent classes to improve the utilization of similarity information between prototype and query features. The proposed modules, including a latent prototype sampling module and a contrastive enhancement module, significantly improve the performance of state-of-the-art methods for few-shot segmentation.

DIGITAL SIGNAL PROCESSING (2024)

Article Engineering, Electrical & Electronic

Analysis of the channel estimate model in passive radar using OFDM waveforms

Xiaoyong Lyu, Baojin Liu, Wenbing Fan, Zhi Quan

Summary: This paper provides an in-depth analysis of the channel estimate model (CEM) in passive radar using orthogonal frequency division multiplexing (OFDM) waveforms. The authors propose a new CEM that takes into consideration the influence of inter-carriers interference (ICI). The theoretical analysis and simulation results support the effectiveness of the new CEM and the proposed method for canceling ICI.

DIGITAL SIGNAL PROCESSING (2024)

Article Engineering, Electrical & Electronic

Neighborhood preserving embedding with autoencoder

Ruisheng Rana, Jinping Wang, Bin Fang, Weiming Yang

Summary: This paper introduces an improved neighborhood preserving embedding method (NPEAE), which utilizes a linear autoencoder to achieve more accurate and effective data projection from high-dimensional space to low-dimensional space. NPEAE performs better in recognition accuracy compared to other comparative methods.

DIGITAL SIGNAL PROCESSING (2024)

Article Engineering, Electrical & Electronic

Fast real-valued tensor decomposition framework for parameter estimation in FDA-MIMO radar

Yuehao Guo, Xianpeng Wang, Jinmei Shi, Lu Sun, Xiang Lan

Summary: This article presents a fast real-valued tensor propagator method for FDA-MIMO radar. The method improves estimation accuracy by utilizing the original structural information of multidimensional data and eliminates the high computational complexity of high-order singular value decomposition. The proposed algorithm achieves parameter estimation at low snapshots and has lower computational complexity than other algorithms at high snapshots.

DIGITAL SIGNAL PROCESSING (2024)

Article Engineering, Electrical & Electronic

Robust moving target detection for FDA-MIMO radar with steering vector mismatches

Bang Huang, Wen-Qin Wang, Weijian Liu, Shunsheng Zhang, Yizhen Jia

Summary: This paper studies the robust moving target detection problem in FDA-MIMO radar with an unknown covariance matrix in Gaussian clutter. The proposed approach adopts the subspace method and proposes three robust adaptive detectors, which are validated to be effective.

DIGITAL SIGNAL PROCESSING (2024)

Article Engineering, Electrical & Electronic

An intelligent momentum perturbed variable step-size adaptive algorithm for fast converging HNANC systems

Asutosh Kar

Summary: In this paper, a class of variable step size adaptive algorithms is developed for hybrid narrow-band active noise control (HNANC) systems and compared with the existing state-of-the-art methods. Two algorithms are proposed for HNANC systems operating in multiple noise environments, and their performance is analyzed. The results demonstrate significant improvement in noise reduction compared to the counterparts.

DIGITAL SIGNAL PROCESSING (2024)

Article Engineering, Electrical & Electronic

Multi-sensor fusion rolling bearing intelligent fault diagnosis based on VMD and ultra-lightweight GoogLeNet in industrial environments

Shouqi Wang, Zhigang Feng

Summary: With the rapid development of artificial intelligence and sensor technology, intelligent fault diagnosis methods based on deep learning are widely used in industrial production. In practical applications, complex noise environments and huge model parameters affect the performance and cost-effectiveness of diagnostic models. In this paper, a lightweight intelligent fault diagnosis model using multi-sensor data fusion is proposed to address these issues. By processing vibration signals from different sensors of rolling bearings using variational mode decomposition (VMD) and designing unique grayscale feature maps based on each intrinsic modal function (IMF) component, the proposed model achieves high accuracy diagnosis in noisy environments while meeting the requirements of small, light, and fast production. The ultra-lightweight GoogLeNet model (ULGoogLeNet) is constructed by adjusting the traditional GoogLeNet structure, and the ultra-lightweight subspace attention module (ULSAM) is introduced to reduce model parameters and enhance feature extraction capability. Experimental results on two datasets demonstrate the effectiveness and superiority of the proposed method.

DIGITAL SIGNAL PROCESSING (2024)

Article Engineering, Electrical & Electronic

Integration of audio-visual information for multi-speaker multimedia speaker recognition

Jichen Yang, Fangfan Chen, Yu Cheng, Pei Lin

Summary: Recently, there has been significant attention on multi-speaker multimedia speaker recognition (MMSR). This study explores innovative techniques for integrating audio and visual cues from the front-end representations of both speaker's voice and face. Experimental results show that these techniques achieve considerable improvements in the performance of MMSR.

DIGITAL SIGNAL PROCESSING (2024)