期刊文献+

用于图像Hash的视觉相似度客观评价测度 被引量:4

Perceptual Similarity Metric for Application to Robust Image Hashing
下载PDF
导出
摘要 由于评价图像Hash性能时,要求对两幅图像是否在感知上相似做出判断,因此针对这一需求,提出了一种衡量感知相似程度的评价测度。该测度的确定是先对图像进行低通滤波,再进行图像重叠分块;然后运用相关系数检测法计算每一对分块的相似程度,并对相似系数归一化,再分别计算若干个最小和最大的归一化相似系数的乘积;最后用最小相似系数乘积与最大相似系数乘积的比值作为感知相似性的测度。实验结果表明,该测度不仅可有效反映图像视觉质量的变化,而且能较好地区分两幅图像是否存在重要的视觉差异,其对感知相似进行评价的性能优于峰值信噪比。 To measure perceptual similarity between an original image and its modified version, we propose an objective measure that is relatively stable to normal image processing but quite sensitive to significant changes of the image content in local areas. This is achieved by low-pass filtering the two images, dividing them into overlapping blocks and determining similarity between the corresponding blocks in terms of correlation coefficient that is mapped to the interval [0, 1 ]. Based on previous calculated correlation coefficients, a ratio is calculated between the smallest and largest correlation coefficients and defined as the perceptual similarity. Experimental results show that the proposed metric is not substantially affected by normal image processing. It provides indication of changes in the image contents when its value becomes less than a given threshold. The proposed metric is useful in applications such as image hashing and CBIR.
出处 《中国图象图形学报》 CSCD 北大核心 2008年第10期2039-2042,共4页 Journal of Image and Graphics
基金 国家自然科学基金项目(60502039 60773079) 国家高技术研究发展计划(863)项目(2007AA01Z477)
关键词 感知相似 客观评价 图像HASH 图像摘要 图像索引 perceptual similarity, objective measure, image hashing, image digest, image indexing
  • 相关文献

参考文献10

  • 1Venkatesan R, Koon S-M, Jakubowski M H, et al. Robust image hashing [ A ]. In: Proceedings of IEEE International Conference on Image Processing [ C ], Vancouver, Canada, 2000: 664- 666. 被引量:1
  • 2Fridrich J , Goljan M , Robust hash functions for digital watermarking [ A ]. In: Proceedings IEEE International Conference on Information Technology: Coding and Computing [ C ] , Las Vergas, NA, USA, 2000:178 - 183. 被引量:1
  • 3Lin C Y, Chang S F. A robust image authentication system distinguishing JPEG compression from malicious manipulation [ J ]. IEEE Transactions on Circuits System and Video Technology, 2001, 11(2) : 153 - 168. 被引量:1
  • 4Lefebvre F , Macq B , Legat J D. RASH : Radon soft hash algorithm [ A ]. In: Proceedings of European Signal Processing Conference [ C ] , Toulouse, France, 2002:299 - 302. 被引量:1
  • 5Roover C De, Vleeschouwer C De, Lefehvre F, et al. Robust video hashing based on radial projections of key frames [ J ]. IEEE Transactions on Signal Processing, 2005, 53(10) : 4-020 -4036. 被引量:1
  • 6Lu C-S , Hsu C-Y , Sun S-W, et al. Robust mesh-based hashing for copy detection and tracing of images [ A ]. In : Proceedings of IEEE International Conference on Multimedia and Expo [ C ], Taipei, Taiwan, China, 2004:731 - 734. 被引量:1
  • 7Swaminathan A, Mao Y, Wu M. Robust and secure image hashing [J]. IEEE Transactions on Information Forensics and Security, 2006,1(2) : 215 -230. 被引量:1
  • 8Kozat S S, Mihcak K, Venkatesan R. Robust perceptual image hashing via matrix invariants [ A ]. In: Proceedings of IEEE Conference on Image Processing [ C ], Singapore, 2004 : 3443 - 3446. 被引量:1
  • 9Monga V, Mihcak M K. Robust and secure image hashing via non-negative matrix factorizations [J]. IEEE Transactions on Information Forensics and Security, 2007, 2 (3) : 376 -390. 被引量:1
  • 10Petitcolas F A P. Watermarking schemes evaluation [ J]. IEEE Signal Processing Magazine, 2000, 17 (5) : 58 - 64. 被引量:1

同被引文献38

  • 1秦川,王朔中,张新鹏.一种基于视觉特性的图像摘要算法[J].中国图象图形学报,2006,11(11):1678-1681. 被引量:17
  • 2Jafari-Khouzani K,Soltanian-Zadeh H.Rotation-invariant multiresolution texture analysis using radon and wavelet transforms[J].IEEE Transactions on Image Processing,2005,14(6):783-795. 被引量:1
  • 3Simitopoulos D,Koutsonanos D E,Strintzis M G.Robust image watermarking based on generalized radon transformations[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):732-745. 被引量:1
  • 4Monga V,Evans B L.Percoptual image hashing via feature points:performance evaluation and tradeoffs[J].IEEE Transactions on Image Processing,2006,15(11):3452-3465. 被引量:1
  • 5Lin C Y,Chang S F.A robust image authentication method distinguishing JPEG compression from malicious manipulation[J].IEEE Transactions on Circuits and Systems for Video Technology,2001,11 (2):153-168. 被引量:1
  • 6Xiang S J,Kim H J,Huang J W.Histogram-based image hashing scheme robust against geometric deformation[C]//Proc of the 9th ACM Workshop on Multimedia and Security,Texas,USA,2007:121-128. 被引量:1
  • 7Galigekere R R,Swamy M N S,Fenster A.Moment patterns in the radon space[J].Society of Photo-Optical Instrumentation Engineers,2000,39:1088-1097. 被引量:1
  • 8Hjouj F,Kammler D W.Identification of reflected,scaled,translated,and rotated objects from their radon projections[J].IEEE Transactions on Image Processing,2008,17(3):301-310. 被引量:1
  • 9VENKATESAN R,KOON S,JAKUBOWSKI M ,et al. Robust image hashing[C]//Proceedings of IEEE International Conerence on Image Processing. Los AIamitos ,CA :IEEE Computer Society, 2000 : 664-666. 被引量:1
  • 10LIN Ching-yung,CHANG Shih-fu. A robust image authentication method distinguishing JPEG compression from ma- licious manipulation[J]. IEEE Transactions on Circuits and Systems for Video Technology,2001,11 (2)=153-168. 被引量:1

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部