• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于哈希的稀疏图像篡改识别。

Hash-based identification of sparse image tampering.

作者信息

Tagliasacchi Marco, Valenzise Giuseppe, Tubaro Stefano

机构信息

Dipartimento di Elettronica e Informazione, Politecnico di Milano, 20133 Milano, Italy.

出版信息

IEEE Trans Image Process. 2009 Nov;18(11):2491-504. doi: 10.1109/TIP.2009.2028251. Epub 2009 Jul 24.

DOI:10.1109/TIP.2009.2028251
PMID:19635704
Abstract

In the last decade, the increased possibility to produce, edit, and disseminate multimedia contents has not been adequately balanced by similar advances in protecting these contents from unauthorized diffusion of forged copies. When the goal is to detect whether or not a digital content has been tampered with in order to alter its semantics, the use of multimedia hashes turns out to be an effective solution to offer proof of legitimacy and to possibly identify the introduced tampering. We propose an image hashing algorithm based on compressive sensing principles, which solves both the authentication and the tampering identification problems. The original content producer generates a hash using a small bit budget by quantizing a limited number of random projections of the authentic image. The content user receives the (possibly altered) image and uses the hash to estimate the mean square error distortion between the original and the received image. In addition, if the introduced tampering is sparse in some orthonormal basis or redundant dictionary, an approximation is given in the pixel domain. We emphasize that the hash is universal, e.g., the same hash signature can be used to detect and identify different types of tampering. At the cost of additional complexity at the decoder, the proposed algorithm is robust to moderate content-preserving transformations including cropping, scaling, and rotation. In addition, in order to keep the size of the hash small, hash encoding/decoding takes advantage of distributed source codes.

摘要

在过去十年中,制作、编辑和传播多媒体内容的可能性增加了,但在保护这些内容不被未经授权传播伪造副本方面,却没有取得类似的进展以达到适当的平衡。当目标是检测数字内容是否被篡改以改变其语义时,使用多媒体哈希结果证明是提供合法性证明并可能识别所引入篡改的有效解决方案。我们提出了一种基于压缩感知原理的图像哈希算法,该算法解决了认证和篡改识别问题。原始内容生产者通过对真实图像的有限数量随机投影进行量化,使用少量比特预算生成哈希。内容用户接收(可能已更改的)图像,并使用该哈希来估计原始图像与接收图像之间的均方误差失真。此外,如果在某些正交基或冗余字典中引入的篡改是稀疏的,则在像素域中给出近似值。我们强调该哈希是通用的,例如,相同的哈希签名可用于检测和识别不同类型的篡改。以解码器处增加的复杂度为代价,所提出的算法对包括裁剪、缩放和旋转在内的适度内容保持变换具有鲁棒性。此外,为了保持哈希的大小较小,哈希编码/解码利用了分布式信源编码。

相似文献

1
Hash-based identification of sparse image tampering.基于哈希的稀疏图像篡改识别。
IEEE Trans Image Process. 2009 Nov;18(11):2491-504. doi: 10.1109/TIP.2009.2028251. Epub 2009 Jul 24.
2
Robust video hashing via multilinear subspace projections.基于多重线性子空间投影的鲁棒视频哈希。
IEEE Trans Image Process. 2012 Oct;21(10):4397-409. doi: 10.1109/TIP.2012.2206036. Epub 2012 Jun 26.
3
Authenticity and integrity of digital mammography images.数字化乳腺钼靶图像的真实性和完整性。
IEEE Trans Med Imaging. 2001 Aug;20(8):784-91. doi: 10.1109/42.938246.
4
A class of authentication digital watermarks for secure multimedia communication.一类用于安全多媒体通信的认证数字水印。
IEEE Trans Image Process. 2001;10(11):1754-64. doi: 10.1109/83.967402.
5
A source-channel coding approach to digital image protection and self-recovery.一种用于数字图像保护和自恢复的信源信道编码方法。
IEEE Trans Image Process. 2015 Jul;24(7):2266-77. doi: 10.1109/TIP.2015.2414878.
6
EVEREST: an efficient method for verification of digital signatures in real-time teleradiology.EVEREST:一种在实时远程放射学中验证数字签名的有效方法。
Stud Health Technol Inform. 2004;107(Pt 2):1241-5.
7
Robust image hashing using ring partition-PGNMF and local features.使用环形划分 - 非负矩阵三因子分解和局部特征的鲁棒图像哈希
Springerplus. 2016 Nov 21;5(1):1995. doi: 10.1186/s40064-016-3639-6. eCollection 2016.
8
Semi-supervised hashing for large-scale search.半监督哈希算法在大规模搜索中的应用
IEEE Trans Pattern Anal Mach Intell. 2012 Dec;34(12):2393-406. doi: 10.1109/TPAMI.2012.48.
9
An adaptable k-nearest neighbors algorithm for MMSE image interpolation.一种用于MMSE图像插值的自适应k近邻算法。
IEEE Trans Image Process. 2009 Sep;18(9):1976-87. doi: 10.1109/TIP.2009.2023706. Epub 2009 May 26.
10
Cross-View Retrieval via Probability-Based Semantics-Preserving Hashing.基于概率的语义保持哈希的跨视图检索。
IEEE Trans Cybern. 2017 Dec;47(12):4342-4355. doi: 10.1109/TCYB.2016.2608906. Epub 2016 Sep 29.

引用本文的文献

1
Block mapping and dual-matrix-based watermarking for image authentication with self-recovery capability.基于块映射和双矩阵的图像认证自恢复水印技术。
PLoS One. 2024 Feb 2;19(2):e0297632. doi: 10.1371/journal.pone.0297632. eCollection 2024.
2
DCU-Net: a dual-channel U-shaped network for image splicing forgery detection.DCU-Net:一种用于图像拼接伪造检测的双通道U型网络。
Neural Comput Appl. 2023;35(7):5015-5031. doi: 10.1007/s00521-021-06329-4. Epub 2021 Aug 12.
3
Dual function seal: visualized digital signature for electronic medical record systems.
双重功能密封:电子病历系统的可视化数字签名。
J Med Syst. 2012 Oct;36(5):3115-21. doi: 10.1007/s10916-011-9795-x. Epub 2011 Nov 3.