• Laser & Optoelectronics Progress
  • Vol. 54, Issue 2, 21004 (2017)
Wang Yanchao1,*, Guo Jingbo1, and Zhou Liyan2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    DOI: 10.3788/lop54.021004 Cite this Article Set citation alerts
    Wang Yanchao, Guo Jingbo, Zhou Liyan. Image Hash Algorithm Based on Data Dimension Reduction and Symmetric Binary Pattern[J]. Laser & Optoelectronics Progress, 2017, 54(2): 21004 Copy Citation Text show less
    References

    [1] Lin Chao, Shen Xueju, Lei Ming, et al. Optical security validation based on orthogonal polarization multiplexing in three-dimensional space[J]. Acta Optica Sinica, 2016, 36(3): 0307001.

    [2] Oommen R S, Jayamohan M, Sruthy S. Using fractal dimension and singular values for image forgery detection and localization [J]. Procedia Technology, 2016, 24: 1452-1459.

    [3] Liu Z, Li Q, Niu X. Improve the security of image robust hash using fuzzy commitment scheme[J]. Neural Computing and Applications, 2013, 23(1): 67-72.

    [4] Li Xinwei, Li Leida. Robust image hashing algorithm based on polar harmonic transform[J].Computer Simulation, 2014, 31(5): 293-296.

    [5] Choi Y S, Park J H. Image hash generation method using hierarchical histogram[J]. Multimedia Tools and Applications, 2012, 61(1): 181-194.

    [6] Zeng Yong, Sun Shusen, Xia Aijun. Image perceptual hashing based on image normalization and DCT[J]. Journal of Zhejiang Sci-Tech University, 2012, 29(1): 84-88.

    [7] Sun R, Zeng W. Secure and robust image hashing via compressive sensing[J]. Multimedia Tools and Applications, 2014, 70(3): 1651-1665.

    [8] Cheng Xiangzheng, Zeng Chaoyang, Chen Hang, et al. Calibration method of low-resolution sensor based on bilinear interpolation strategy[J]. Laser & Optoelectronics Progress, 2013, 50(7): 071501.

    [9] Fang Wangsheng, Li Yunan, Zhang Rong. Blind watermarking algorithm for color image guided by visual model[J]. Application Research of Computers, 2011, 28(7): 2719-2722.

    [10] Zhang Z, Chen J, Li X, et al. An image matching method based on Fourier and LOG-polar transform[J]. Sensors & Transducers, 2014, 169(4): 61-66.

    [11] Ye Zhen, Bai Lin, Nian Yongjian. Hyperspectral image classification based on Gabor feature and local protection dimension reduction[J]. Acta Optica Sinica, 2016, 36(10): 1028003.

    [12] Tiwari D, Tyagi V. A novel scheme based on local binary pattern for dynamic texture recognition[J]. Computer Vision and Image Understanding, 2016, 150: 58-65.

    [13] Zhang Zhifeng, Pei Zhili. Image forgery detection based on fuzzy local binary pattern operator[J].Computer Engineering and Design, 2015, 36(12): 3284-3290.

    [14] Brinkhuis J, Protasov V. A new proof of the Lagrange multiplier rule[J]. Operations Research Letters, 2016, 44(3): 400-402.

    [15] Zhao Xin. Research on the optimization performance comparison of different one-dimensional chaotic maps[J]. Computer Application of Research, 2012, 29(3): 913-915.

    [16] Schaefer G, Stich M. UCID-an uncompressed colour image database[C]. SPIE, 2004, 5307: 472-480.

    [17] Tang Z, Zhang X, Zhang S. Robust perceptual image hashing based on ring partition and nonnegative matrix factorization[J]. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(3): 711-724.

    CLP Journals

    [1] [in Chinese], [in Chinese]. A Robust Compact Image Hash Algorithm Zhang Zhifeng, Pei Zhili[J]. Laser & Optoelectronics Progress, 2017, 54(10): 101002

    [2] Peng Yanfei, Wu Hong, Zi Lingling. Image Retrieval Based on Hash Method and Generative Adversarial Networks[J]. Laser & Optoelectronics Progress, 2018, 55(10): 101002

    Wang Yanchao, Guo Jingbo, Zhou Liyan. Image Hash Algorithm Based on Data Dimension Reduction and Symmetric Binary Pattern[J]. Laser & Optoelectronics Progress, 2017, 54(2): 21004
    Download Citation