The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The researches on Human Visual System (HVS) lead to more comprehension in the visual perceptibility of human eyes and make dramatic contribution in image quality assessment. However, few perceptual hashing algorithms take the visual perceptibility into account. In this paper, we propose a new visual threshold adjustable perceptual hashing method under the guidance of Watson's visual model. This method...
Although image robust hashing has drawn many attentions as a promising image authentication technique, the tamper detection and localization of robust hash algorithm has not been explored thoroughly. The most important difficulty is the conflict that the hash value is supposed to be robust to common content-preserving manipulations (CPM), such as lossy compression, but sensitive to malicious tamper...
A novel image perceptual hashing method is proposed on the intermediate hashing stage. It first uses the iterative geometric techniques to get main geometric features. Then, by the observation that the distances of feature points are invariant in the polar coordinate under arbitrary rotation, a novel processing method is proposed to arrange the two-dimensional distribution to a one-dimensional feature...
Perceptual hashing as a new technique for the multimedia content security have been widely discussed.However, the robustness requirement of perceptual hashing brings big challenges to its security. In this paper, we propose a secure enhancement scheme for image perceptual hashing based on error correction coding. By employing error correcting code, images with similar perceptual contents can be mapped...
A novel image perceptual hashing algorithm is proposed on the intermediate hashing stage. It first uses an iterative geometric technique to extract significant geometry preserving feature points. Then, the fuzzy distance matching method is proposed based on the observation that the distances of feature points are invariant in the polar coordinate under arbitrary rotation. It is verified that the proposed...
An arbitrarily rotated image should not be recognized as a different one, but the conventional image perceptual hashing algorithms can only deal with this partially. Different to watermarking, image perceptual hashing does not need to embed information into the image content, this make it possible that perceptual hashing can treat the synchronization problem in a new manner. In this paper, three cyclic...
Traditionally, the proposed perceptual hashing algorithms are mainly focused on the feature extraction and coding stages. But they only concerned parts of perception information, and take a certain type of features to obtain codes, which makes them to be biased on resisting some varieties of attacks. On the other hand, HVS (Human Visual System) as one of best methods simulating the image cognitive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.