2016 IEEE Trustcom/BigDataSE/Ispa 2016
DOI: 10.1109/trustcom.2016.0040
|View full text |Cite
|
Sign up to set email alerts
|

A Robust Image Hashing with Enhanced Randomness by Using Random Walk on Zigzag Blocking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(29 citation statements)
references
References 11 publications
0
25
0
Order By: Relevance
“…To illustrate the advantage, our hashing is compared with some baseline hashing algorithms. The selected hashing algorithms include invariant moments‐based hashing [19], random walk‐based hashing [26], weighted DWT features‐based hashing [10], CVA‐DWT hashing [22] and hybrid features‐based hashing [32]. The image datasets described in Sections 3.1 and 3.2 are also used to validate robustness and discrimination of the compared algorithms.…”
Section: Performance Comparisonsmentioning
confidence: 99%
See 1 more Smart Citation
“…To illustrate the advantage, our hashing is compared with some baseline hashing algorithms. The selected hashing algorithms include invariant moments‐based hashing [19], random walk‐based hashing [26], weighted DWT features‐based hashing [10], CVA‐DWT hashing [22] and hybrid features‐based hashing [32]. The image datasets described in Sections 3.1 and 3.2 are also used to validate robustness and discrimination of the compared algorithms.…”
Section: Performance Comparisonsmentioning
confidence: 99%
“…This ring‐based hashing can resist image rotation with any angle. Recently, Huang et al [26] used a random walk on zigzag blocking to improve the security of image hashing. Qin et al [27] exploited block truncation coding to design an image hashing algorithm with good perceptual robustness.…”
Section: Introductionmentioning
confidence: 99%
“…To show the advantages of our algorithm, we select some excellent algorithms to compare. The selected algorithms include Random-walking hash algorithm [38], QSVD hash algorithm [19], SVD-CSLBP hash algorithm [17], Laplacian Pyramids hash algorithm [20], A hash algorithm based on deep convolutional neural network(DCNN) [39]. These algorithms above are hash algorithms recently published in journals or conferences.…”
Section: Performance Comparisonsmentioning
confidence: 99%
“…After the SAR image processed by the optical system, we perform a zigzag scan [11] for the cosine transform spectral coefficients, and then do the inverse cosine transformation on the image to obtain a reconstructed image. Zigzag algorithm is always used to compress the image after the DCT.…”
Section: Post‐process and Technical Detailsmentioning
confidence: 99%