2019
DOI: 10.3390/app9152972
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Perceptual Hash Algorithm Based on U-Net for the Authentication of High-Resolution Remote Sensing Image

Abstract: Data security technology is of great significance for the effective use of high-resolution remote sensing (HRRS) images in GIS field. Integrity authentication technology is an important technology to ensure the security of HRRS images. Traditional authentication technologies perform binary level authentication of the data and cannot meet the authentication requirements for HRRS images, while perceptual hashing can achieve perceptual content-based authentication. Compared with traditional algorithms, the existi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
24
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 18 publications
(24 citation statements)
references
References 39 publications
0
24
0
Order By: Relevance
“…Its usage can be expanded further by considering different types of archaeo‐geophysical data and thus become a robust tool in archaeological prospection. On top of the above, U‐Net seems to be one of the most widely used architectures for image segmentation in various disciplines with a number of enhancements and upgrades of it arising continuously, benefiting its applicability (Ding, Yang, Wang, & Liu, ; Falk et al, ; Zhang et al, ).…”
Section: Discussionmentioning
confidence: 99%
“…Its usage can be expanded further by considering different types of archaeo‐geophysical data and thus become a robust tool in archaeological prospection. On top of the above, U‐Net seems to be one of the most widely used architectures for image segmentation in various disciplines with a number of enhancements and upgrades of it arising continuously, benefiting its applicability (Ding, Yang, Wang, & Liu, ; Falk et al, ; Zhang et al, ).…”
Section: Discussionmentioning
confidence: 99%
“…Therefore, hashing methods can accelerate ANN search procedures and save on storage. Recently, hashing methods have been applied in the area of computer vision and machine learning [3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%
“…This scheme does not give proper output and the edges get blurred in the resultant image. Ding et al [11] have proposed integrity authentication scheme for remote sensing images wherein they have utilised perceptual hash scheme based on deep learning concepts. PCA is used to extract the features and perceptual hash is ITM Web of Conferences 32, 03049 (2020) https://doi.org/10.1051/itmconf/20203203049 ICACC-2020 calculated on it.…”
Section: Introductionmentioning
confidence: 99%