Dissertation > Excellent graduate degree dissertation topics show

Perception hash algorithm benchmark research and design platform

Author: LiuShuiSheng
Tutor: NiuXiaMu
School: Harbin Institute of Technology
Course: Computer Science and Technology
Keywords: Digital signature Perception hash Authenticate Identification Benchmark Plug-in structure
CLC: TP301.6
Type: Master's thesis
Year: 2008
Downloads: 51
Quote: 0
Read: Download Dissertation


As multimedia technology and network technology and the rapid development and wide application of digital multimedia products storage, processing and transmission become more convenient and efficient, multimedia authenticity certification and copyright protection issues become increasingly important. However, since the large amount of multimedia data, with different compression standards and file formats, always maintaining the quality of content through a variety of conventional signal processing operations (such as JPEG compression, etc.); the traditional encryption and authentication techniques (such as MD5 and SHA-1 etc.) can only bitstream authentication, the multimedia content can not be considered, even if any bit of the bit change is a very sensitive, and thus will be powerless multimedia certification. Hashing techniques perception perceived level of information to establish a multimedia summary to their perception of the mapping between the look / sound similar media objects with similar hash value perception, the performance of its normal signal processing operation at the same time robust, with perception of the media content tampering sensitivity. Perception hashing techniques are emerging research directions, can be used to authenticate and identify multimedia content indexing and analysis, digital watermark, mass media library management, and copy detection, and many other fields. The new hash algorithm constantly made aware, in order to achieve the hashing algorithm performance evaluation perceived fairness and efficiency, thus contributing to the development of technology-aware hash, hash perceive this subject on the synthesis and analysis of relevant literature on the basis of clear perception hash concept, the perception of a group of hash algorithm performance, and ultimately establish a sound image perception hash algorithm performance benchmarking framework and tools platform. The research topic and work mainly includes the following aspects: (1) combined with the human visual / auditory characteristics and cognitive psychology and other related knowledge on perceived hashing technique theoretical research, analyze and summarize the perception hash definitions, characteristics, Improved perception hash generation framework, the establishment of perception hash application mode, pointing out that the design goals of the hash algorithm perception and the perception of inadequate hash; (2) test for cognitive hash random factors, there are many abstract designs and implements Bus-based software framework for flexible, scalable perception hash algorithm benchmarking tool in the tool design process also raised the variable space and classes of function method, a test tool to achieve unified management functions for processing; ( 3) on the perception of the attack on the hash easy to classify, to establish a perception hash algorithm performance analysis framework design is based on the perception of this hash algorithm to establish benchmarking platform and algorithm performance analysis framework perception hash algorithm performance evaluation experiments, complete performance analysis of the proposed algorithm while evaluating ideas and tools were verified. This topic summarizes the perception of a large number of hash technology research, evaluation criteria for the establishment of perception hash made useful work, the future development of the technology has a certain significance. Experimental results show that the algorithm performance analysis method objectivity is strong, has a certain reference value, the algorithm testing testing tools to improve efficiency and reduce the complexity of the algorithm is tested.

Related Dissertations

  1. Temperature Drift Modeling and Compensation of Fiber-Optic Gyroscopes,V241.5
  2. Simulation and Analysis about Switched Reluctance Generator Power Supply System,TM31
  3. Research on Vector Control System of Induction Motor Based on DSP,TM346
  4. Compensation Methods of Different Speech Coding for Speaker Recognition,TN912.34
  5. Subliminal Channel in Multisignature,TN918.1
  6. Study on System of Electronic Documetnt Security Signature,TN918.2
  7. Design and Simulation of UHF RFID System Based on the Protocol of EPC C1G2,TP391.44
  8. The Software Component Modeling Method Based on Feature and Its Application in VMI Management System,TP311.52
  9. The Study of Domain Dictionary Construction Based on Web,TP391.1
  10. Research on the Control and Remedy of Nanopositioning Stage Drived by Piezo Material Lead Zirconate Titanate,TP273
  11. Aerial Target Anti-interference Recognition and Tracking System,TN215
  12. The Study on Rhinoceros Horn and Its Imitation,TS932.2
  13. Characterization of Corn Lectin and Application to Screen of Growth-promoting Bacteria from Corn Rhizosphere,S513
  14. Study on Antioxidant Components of Tibetan Medicine Sanguo Tang San,R29
  15. Over-voltage Identification of Transmission Line Based on Hilbert-Huang Transformation,TM866
  16. Study of Synchronous Generator Excitation Control Based on Neural Network Identification,TM31
  17. Survey in Nanjing and Analysis of the Mitochondrial Genome of Frankliniella Occidentalis (Pergande),S433
  18. Research on Peer-to-Peer Traffic Identification Algorithm Based on Cluster Analysis,TP393.02
  19. Animal products quality safety and security regulation of RFID systems,TS201.6
  20. The Identificationand Rapdanalysis of Wheat Root Lesion Pathogens in Henan Province,S435.121
  21. Identification on the Species and Pathotypes of Four Cereal Cyst Nematode Populations from Western and Northern Henan,southern Hebei and Evaluation of Wheat Cultivars Resistance to Two Populations,S435.121

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Theories, methods > Algorithm Theory
© 2012 www.DissertationTopic.Net  Mobile