Applications of perceptual hash algorithm in agriculture images

According to the characteristics of agriculture image, new image recognition scheme and image authentication scheme were designed, which based on perceptual hash algorithm. Some tomato leaf diseases pictures were used to achieve image perceptual hash feature extraction. And the experimental results show that the same diseases images have closer perceptual hash characteristics.

[1]  Wen-Nung Lie,et al.  Data hiding in images with adaptive numbers of least significant bits based on the human visual system , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[2]  Fernando Pérez-González,et al.  Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis , 2005, Information Hiding.

[3]  Bian Yang,et al.  Block Mean Value Based Image Perceptual Hashing , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[4]  Minh N. Do,et al.  Nonsubsampled contourlet transform: construction and application in enhancement , 2005, IEEE International Conference on Image Processing 2005.

[5]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[6]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[7]  Di Wu,et al.  A Robust Contourlet Based Image Hash Algorithm , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[8]  Jiri Fridrich,et al.  Robust bit extraction from images , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[9]  K. Rhee,et al.  A key-dependent secure image hashing scheme by using Radon transform , 2009, 2009 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS).

[10]  Andrew W. H. Ip,et al.  Robust Image Hashing for Image Authentication Based on DCT-DWT Composite Domain , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.

[11]  Zhang Xinpeng,et al.  Image block feature vectors based on a singular-value information metric and color-texture description , 2007 .

[12]  Ping Li,et al.  Robust image copy detection using multi-resolution histogram , 2010, MIR '10.

[13]  Zhihua He,et al.  Color texture retrieval through contourlet-based hidden Markov model , 2005, IEEE International Conference on Image Processing 2005.

[14]  Ingemar J. Cox,et al.  Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..

[15]  Jong Hyuk Park,et al.  Image hash generation method using hierarchical histogram , 2010, Multimedia Tools and Applications.

[16]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2000, MULTIMEDIA '00.

[17]  Hui Zhang,et al.  A Cyclic Coding Based Perceptual Hashing Algorithm , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.

[18]  Vishal Monga,et al.  Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.

[19]  Fouad Khelifi,et al.  Analysis of the Security of Perceptual Image Hashing Based on Non-Negative Matrix Factorization , 2010, IEEE Signal Processing Letters.

[20]  Vishal Monga,et al.  Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.

[21]  Jiwu Huang,et al.  Histogram-based image hashing scheme robust against geometric deformations , 2007, MM&Sec.

[22]  Ton Kalker,et al.  A robust image fingerprinting system using the Radon transform , 2004, Signal Process. Image Commun..

[23]  Jean-Didier Legat,et al.  RASH: RAdon soft hash algorithm , 2002, 2002 11th European Signal Processing Conference.