• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Qin Chuan, Chang Chin Chen, Guo Cheng. Perceptual Robust Image Hashing Scheme Based on Secret Sharing[J]. Journal of Computer Research and Development, 2012, 49(8): 1690-1698.
Citation: Qin Chuan, Chang Chin Chen, Guo Cheng. Perceptual Robust Image Hashing Scheme Based on Secret Sharing[J]. Journal of Computer Research and Development, 2012, 49(8): 1690-1698.

Perceptual Robust Image Hashing Scheme Based on Secret Sharing

More Information
  • Published Date: August 14, 2012
  • Since the cryptographic Hash function is sensitive, any slight change of the input message will influence the result of the Hash value significantly. But for the scenario of image hashing, the traditional cryptographic Hash functions will not be suitable. This is due to the fact that the images usually must undergo various manipulations and many of the manipulations are content-preserving, even though the digital representations of the images will be changed. This paper proposes a perceptual robust image hashing scheme, which can be applied in the fields such as image retrieval and authentication. Image resizing and total-variation-based filtering are firstly used to pre-process the input image for regularization. The sign relationship matrix of DCT low frequency coefficients for each image block and and corresponding neighborhood are then extracted, which can effectively reflect the distribution feature of local image content. The extracted feature matrix is finally compressed using the secret sharing mechanism to produce the final binary Hash after scrambling. The security of the scheme completely depends on the secret keys. Experiments are conducted to show the presented scheme has satisfactory robustness performance against perceptually content-preserving manipulations, e.g., JPEG compression, Gaussian low-pass filtering, and resizing, and simultaneously has very low anti-collision probability for the hashes of distinct images.
  • Related Articles

    [1]Yin Xiaokang, Lu Bin, Cai Ruijie, Zhu Xiaoya, Yang Qichao, Liu Shengli. Memory Copy Function Identification Technique with Control Flow and Data Flow Analysis[J]. Journal of Computer Research and Development, 2023, 60(2): 326-340. DOI: 10.7544/issn1000-1239.202110990
    [2]Yang Fan, Li Fei, Shu Jiwu. Survey on Secure Persistent Memory Storage[J]. Journal of Computer Research and Development, 2020, 57(5): 912-927. DOI: 10.7544/issn1000-1239.2020.20190820
    [3]Miao Dongjing, Liu Xianmin, Li Jianzhong. An Algorithm on Mining Approximate Functional Dependencies in Probabilistic Database[J]. Journal of Computer Research and Development, 2015, 52(12): 2857-2865. DOI: 10.7544/issn1000-1239.2015.20140685
    [4]Li Weibang, Li Zhanhuai, Chen Qun, Jiang Tao, Liu Hailong, Pan Wei. Functional Dependencies Discovering in Distributed Big Data[J]. Journal of Computer Research and Development, 2015, 52(2): 282-294. DOI: 10.7544/issn1000-1239.2015.20140229
    [5]Liu Xianmin, Li Jianzhong. Discovering Extended Conditional Functional Dependencies[J]. Journal of Computer Research and Development, 2015, 52(1): 130-140. DOI: 10.7544/issn1000-1239.2015.20130691
    [6]Xue Jinrong, An Qiusheng, Zheng Jun. Intent Reduction of Concept Lattice and Database Inference Dependence[J]. Journal of Computer Research and Development, 2014, 51(1): 96-103.
    [7]Zeng Kun and Yang Xuejun. A Best-Effort Hardware Transactional Memory Based on Dependency Graph[J]. Journal of Computer Research and Development, 2012, 49(1): 44-54.
    [8]Chen Chi, Feng Dengguo, and Xu Zhen. Research on Database Transaction Recovery Log and Intrusion Response[J]. Journal of Computer Research and Development, 2010, 47(10): 1797-1804.
    [9]Hao Zhongxiao, Li Yanjuan. Study on Membership Problem with Respect to Temporal Functional Dependencies and Temporal Multivalued Dependencies[J]. Journal of Computer Research and Development, 2006, 43(7): 1267-1272.
    [10]Lü Teng, Yan Ping. Functional Dependencies and Inference Rules for XML[J]. Journal of Computer Research and Development, 2005, 42(5): 792-796.

Catalog

    Article views (1049) PDF downloads (551) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return