Font Size: a A A

Research On Image Tampering Detection Method Based On Multi-attack Generation Perceptual Hash

Posted on:2021-06-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y J WangFull Text:PDF
GTID:2518306494494554Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The rapid growth of multimedia data and image editing softwares have given rise to large amounts of doctored images circulating in our daily lives.Thus,security and identification of media content has become an important and demanding area for research.Perceptual hashing is one of the recent technologies used for multimedia content security.Perceptual hashing is used for multimedia content identification and authentication through perception digests based on the understanding of multimedia content.Perceptual image hashing for image authentication has been intensively investigated owing to the speed and memory efficiency.This paper firstly presents a literature review of image hashing for image authentication in the last decade,and classifies these algorithms into different categories.Secondly,a new perceptual hash learning algorithm scheme is proposed for solving the problems of existing schemes.Th specific research works are as follows:We present a Multi-Attack Reference Hashing(MRH)method based on hashing cluster for image authentication,which is expected to use prior information,i.e.the supervised content-preserving images and multiple attacks for feature generation and final reference hashing code generation.Extensive experiments on benchmark datasets have validated the effectiveness of our proposed method.
Keywords/Search Tags:Image authentication, Multi-Attack, Reference Hashing, Perceptual image hashing
PDF Full Text Request
Related items