应用科学学报 ›› 2012, Vol. 30 ›› Issue (1): 75-81.doi: 10.3969/j.issn.0255-8297.2012.01.012

• 信号与信息处理 • 上一篇    下一篇

结合保角变换和Zernike矩的稳健图像Hash

赵琰1;2, 王朔中1, 姚恒1, 吴蔚1   

  1. 1. 上海大学通信与信息工程学院,上海200072
    2. 上海电力学院计算机与信息工程学院,上海200090
  • 收稿日期:2011-01-30 修回日期:2011-09-13 出版日期:2012-02-09 发布日期:2012-01-30
  • 作者简介:作者简介:赵琰,博士生,研究方向:图像处理、多媒体技术,E-mail:yanzhao@shu.edu.cn;王朔中,教授,博导,研究方向:图像处理、多媒体信息安全、水声学,E-mail: shuowang@online.sh.cn
  • 基金资助:

    国家自然科学基金(No.60773079, No.60872116, No.60832010)资助

Perpetual Image Hashing Based on Conformal Mapping and Zernike Moments

ZHAO Yan1;2, WANG Shuo-zhong1, YAO Heng1, WU Wei1   

  1. 1. Department of Communication and Information Engineering, Shanghai University, Shanghai 200072, China
    2. Department of Computer and Information Engineering, Shanghai University of Electric Power,
    Shanghai 200090, China
  • Received:2011-01-30 Revised:2011-09-13 Online:2012-02-09 Published:2012-01-30

摘要:

 提出一种用于图像认证和篡改检测的稳健图像Hash方法. 根据密钥对图像进行伪随机分块,将图像块规格化为大小相等的正方形并进行保角变换,使各图像块映射为单位圆. 对各圆形图像区域计算修正的Zernike矩,连接所有Zernike矩的幅度和相位,基于密钥置乱得到所要求的图像Hash. 与直接对正方形内切圆计算Zernike矩
的方法相比,保角变换使图像块四角纳入Hash所表征的图像内容,因而有效改进了篡改检测性能. 图像分块使Hash具备篡改定位的能力. 实验表明该方法具有很低的碰撞概率和良好的感知稳健性,与其他方法相比,碰撞率和检错率较低.

关键词: 图像Hash, 保角变换, Zernike矩, 图像认证, 篡改检测

Abstract:

Abstract: We propose a perpetual image hashing method applicable to image authentication and tamper detection. The input image is pseudo-randomly partitioned into blocks, which are resized to become squares of a standard size and mapped to a unit circle by conformal mapping. Zernike moments of the circular-shaped “images” are calculated, and then modified by multiplying an exponent to achieve phase rotation-invariance.
All amplitudes and phases of the modified Zernike moments are concatenated to form an intermediate Hash sequence. The final Hash is produced by pseudo-randomly permuting the intermediate Hash. The purpose of conformal mapping is to include information contained in the corners of square image blocks into the extracted image Hash so that the tamper detection capability is significantly enhanced. Experimental results show that the proposed method is robust against most content-preserving image processing operations. Image blocking allows the tampered regions in the image to be correctly located. Compared to some other techniques, the method has low probabilities of collision and less error in tamper detection.

Key words: image Hash, conformal mapping, Zernike moments, image authentication, tampering detection

中图分类号: