2020
DOI: 10.3390/ijgi9040254
|View full text |Cite
|
Sign up to set email alerts
|

High-Resolution Remote Sensing Image Integrity Authentication Method Considering Both Global and Local Features

Abstract: Content integrity of high-resolution remote sensing (HRRS) images is the premise of its usability. Existing HRRS image integrity authentication methods are mostly binary decision-making processes, which cannot provide a further interpretable information (e.g., tamper localization, tamper type determination). Due to this reason, a robust HRRS images integrity authentication algorithm using perceptual hashing technology considering both global and local features is proposed in this paper. It extracts global feat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 35 publications
0
14
0
Order By: Relevance
“…The information regarding various bands of RS images often has certain differences, but the existing perceptual hash algorithms (including subject-sensitive hashing) for RS images often do not take this difference into account. The existing perceptual hash algorithms for RS images [13][14][15][16] generally perform a grayscale operation on the original image in the preprocessing stage and then extract the characteristics of the obtained grayscale image. This obviously does not take into account the band differences of RS images.…”
Section: Ph(i) = Ph Imentioning
confidence: 99%
See 1 more Smart Citation
“…The information regarding various bands of RS images often has certain differences, but the existing perceptual hash algorithms (including subject-sensitive hashing) for RS images often do not take this difference into account. The existing perceptual hash algorithms for RS images [13][14][15][16] generally perform a grayscale operation on the original image in the preprocessing stage and then extract the characteristics of the obtained grayscale image. This obviously does not take into account the band differences of RS images.…”
Section: Ph(i) = Ph Imentioning
confidence: 99%
“…Perceptual hash [11,12] overcomes the shortcomings of cryptography technologies and digital watermarking technology and has strong application prospects. Some scholars have carried out related research on perceptual hash authentication algorithms of RS images, leading to some encouraging results [13][14][15].…”
Section: Introductionmentioning
confidence: 99%
“…Perceptual hash originated from digital watermarking technology, in which it is used as embedded watermarking information, and later became an independent technology. Perceptual hash has been widely used in image retrieval [25][26][31][32], image copy detection [33][34], and image integrity authentication [20][21][22][23][35][36].…”
Section: Related Workmentioning
confidence: 99%
“…Our subject-sensitive hashing algorithm based on Semi-U-Net follows the general steps of subject-sensitive hashing, which consists of preprocessing, subject-sensitive feature extraction, compression encoding, and encryption, as shown in Figure 4: 1) Preprocessing mainly performs operations such as resampling and channel fusion on HRRS images, so that HRRS images can meet the input requirement of Semi-U-Net. If the HRRS image is too large in practical applications, the method similar to [21][22] [29] can be used to divide the HRRS image into grids first, and then our algorithm is used. Since our research focuses on lightweight deep neural networks, we do not consider that case.…”
Section: B Semi-u-net Based Subject-sensitive Hashing Algorithm 1) Process Of Semi-u-net Based Subject-sensitive Hashingmentioning
confidence: 99%
See 1 more Smart Citation