Abstract
Hashing method is an efficient technique of multimedia security for content protection. It maps an image into a content-based compact code for denoting the image itself. While most existing algorithms focus on improving the classification between robustness and discrimination, little attention has been paid to geometric invariance under normal digital operations, and therefore results in quite fragile to geometric distortion when applied in image copy detection. In this article, a novel effective image hashing method is proposed based on geometric invariant vector distance in both spatial domain and frequency domain. First, the image is preprocessed by some joint operations to extract robust features. Then, the preprocessed image is randomly divided into several overlapping blocks under a secret key, and two different feature matrices are separately obtained in the spatial domain and frequency domain through invariant moment and low frequency discrete cosine transform coefficients. Furthermore, the invariant distances between vectors in feature matrices are calculated and quantified to form a compact hash code. We conduct various experiments to demonstrate that the proposed hashing not only reaches good classification between robustness and discrimination, but also resists most geometric distortion in image copy detection. In addition, both receiver operating characteristics curve comparisons and mean average precision in copy detection clearly illustrate that the proposed hashing method outperforms state-of-the-art algorithms.
- R. Venkatesan, S.-M. Koon, M. H. Akubowski, and P. Moulin. 2000. A new approach to image copy detection based on extended feature sets. In Proceedings of the IEEE International Conference on Image Processing, Vol. 3, 664--666.Google Scholar
- A. Swaminathan, Y. Mao, and M. Wu. 2006. Robust and secure image hashing. IEEE Trans. Inform. Forens. Secur. 1, 2 (2006), 215--230.Google Scholar
Digital Library
- Z. Tang, X. Zhang, X. Li, and S. Zhang. 2016. Robust image hashing with ring partition and invariant vector distance. IEEE Trans. Inform. Forens. Secur. 11, 1 (2016), 200--214.Google Scholar
Digital Library
- C. De Roover, C. De Vleeschouwer, F. Lefebvre, and B. Macq. 2005. Robust video hashing based on radial projections of key frames. IEEE Trans. Sig. Proc. 53, 10 (2005), 4020--4037.Google Scholar
Digital Library
- X. Lv and Z. Wang. 2012. Perceptual image hashing based on shape contexts and local feature points. IEEE Trans. Inform. Forens. Secur. 7, 3 (2012), 1081--1093.Google Scholar
Digital Library
- F. Khelif and J. Jiang. 2010. Perceptual image hashing based on virtual watermark detection. IEEE Trans. Image Proc. 19, 4 (2010), 981--994.Google Scholar
Digital Library
- Y. Li, Z. Lu, C. Zhu, and X. Niu. 2012. Robust image hashing based on random Gabor filtering and dithered lattice vector quantization. IEEE Trans. Image Proc. 21, 4 (2012), 1963--1980.Google Scholar
Digital Library
- F. Shen, Y. Yang, L. Liu, W. Liu, and D. Tao. 2017. Asymmetric binary coding for image search. Asymm. Bin. Cod. Image Search 19, 9 (2017), 2022--2032.Google Scholar
- A. Menezes, V. Oorschot, and S. Vanstone. 1998. Handbook of Applied Cryptography. CRC Press, 683--683.Google Scholar
- S. Manuel. 2011. Classification and generation of disturbance vectors for collision attacks against SHA-1. Desi., Codes Cryptog. 59, 2 (2011), 247--263.Google Scholar
Digital Library
- F. Balado, N. Hurley, E. McCarthy, and G. Silvestre. 2007. Performance analysis of robust audio hashing. IEEE Trans. Inform. Forens. Secur. 2, 2 (2007), 254--266.Google Scholar
Digital Library
- Z. Tang, X. Zhang, and S. Zhang. 2014. Robust perceptual image hashing based on ring partition and NMF. IEEE Trans. Knowl. Data Eng. 26, 3 (2014), 711--724.Google Scholar
Digital Library
- F. Ahmed, M. Y. Siyal, and V. U. Abbas. 2010. A secure and robust hash based scheme for image authentication. Sig. Proc. 90, 5 (2010), 1456--1470.Google Scholar
Digital Library
- X. Wang, K. Pang, X. Zhou, Y. Zhou, L. Li, and J. Xue. 2015. A visual model-based perceptual image hash for content authentication. IEEE Trans. Inform. Forens. Secur. 10, 7 (2015), 1336--1349.Google Scholar
Digital Library
- K. Li, G. J. Qi, and K. A. Hua. 2018. Learning label preserving binary codes for multimedia retrieval: A general approach. ACM Trans. Multimedia Comput. Commun. Applic. 14, 1 (2018), 2:1--2:23.Google Scholar
Digital Library
- L. Yang, G. Bo, A. Hanjalic, and X. Hua. 2012. A unified context model for web image retrieval. ACM Trans. Multimedia Comput. Commun. Applic. 8, 3 (2012), 28:1--28:19.Google Scholar
Digital Library
- R. Li, B. Bhanu, and A. Dong. 2008. Feature synthesized EM algorithm for image retrieval. ACM Trans. Multimedia Comput. Commun. Applic. 4, 2 (2008), 10:1--10:24.Google Scholar
Digital Library
- Z. Tang, H. Lao, X. Zhang, and K. Liu. 2016. Robust image hashing via DCT and LLE. Comput. Secur. 62 (2016), 133--148.Google Scholar
Cross Ref
- C. Qin and X. Chen. 2018. Perceptual image hashing via dual-cross pattern encoding and salient structure detection. Inform. Sci. 423 (2018), 284--302.Google Scholar
Digital Library
- Z. Tang, Z. Huang, X. Zhang, and H. Lao. 2017. Robust image hashing with multidimensional scaling. Sig. Proc. 137 (2017), 240--250.Google Scholar
Digital Library
- Y. Ou and K. H. Rhee. 2009. A key-dependent secure image hashing scheme by using Radon transform. In Proceedings of the IEEE International Symposium on Intelligent Signal Processing and Communication Systems. 595--598.Google Scholar
- Z. Tang, L. Huang, X. Zhang, and H. Lao. 2016. Robust image hashing based on color vector angle and Canny operator. AEU-Int. J. Electron. Commun. 70, 6 (2016), 833--841.Google Scholar
Cross Ref
- S. S. Kozat, R. Venkatesan, and M. K. Mihcak. 2004. Robust perceptual image hashing via matrix invariants. In Proceedings of the IEEE International Conference on Image Processing, Vol. 5, 3443--3446.Google Scholar
- V. Monga and M. K. Mihcak. 2007. Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans. Inform. Forens. Secur. 2, 3 (2007), 376--390.Google Scholar
Digital Library
- R. Davarzani, S. Mozaffariand, and K. Yaghmaie. 2016. Perceptual image hashing using center-symmetric local binary patterns. Multimedia Tools Applic. 75, 8 (2016), 4639--4667.Google Scholar
Digital Library
- Z. Tang, L. Chen, X. Zhang, and S. Zhang. 2019. Robust image hashing with tensor decomposition. IEEE Trans. Knowl. Data Eng. 31, 3 (2019), 549--560.Google Scholar
Digital Library
- Y. Zhao, S. Wang, X. Zhang, and H. Yao. 2013. Robust hashing for image authentication using Zernike moments and local features. IEEE Trans. Inform. Forens. Secur. 8, 1 (2013), 55--63.Google Scholar
Digital Library
- F. Lefebvre, B. Macq, and J. D. Legat. 2002. RASH: Radon soft hash algorithm. In Proceedings of the European Signal Processing Conference. 299--302.Google Scholar
- D. Nguyen, W. Li, and B. Preneel. 2011. Radon transform-based secure image hashing. In Proceedings of the International Conference on Communications and Multimedia Security, Vol. 7025, 186--193.Google Scholar
- Y. Liu, G. Xin, and Y. Xiao. 2016. Robust image hashing using Radon transform and invariant features. Radioengineering 25, 3 (2016), 556--564.Google Scholar
Cross Ref
- G. Wolberg and S. Zokai. 2002. Robust image registration using log-polar transform. In Proceedings of the International Conference on Image Processing, Vol. 1, 493--496.Google Scholar
- Z. Tang, L. Ruan, C. Qin, X. Zhang, and C. Yu. 2015. Robust image hashing with embedding vector variance of LLE. Dig. Sig. Proc. 53 (2015), 17--27.Google Scholar
Digital Library
- X. Zhu, X. Li, S. Zhang, Z. Xu, L. Yu, and C. Wang. 2017. Graph PCA Hashing for Similarity Search. IEEE Trans. Multimedia 19, 9 (2017), 2033--2044.Google Scholar
Digital Library
- S. Xiang. 2010. Histogram-based perceptual image hashing in the DWT domain. In Proceedings of the International Conference on Multimedia Information Networking and Security, 653--657.Google Scholar
Digital Library
- Z. Tang, Y. Dai, X. Zhang, L. Huang, and F. Yang. 2014. Robust image hashing via colour vector angles and discrete wavelet transform. IET Image Proc. 8, 3 (2014), 142--149.Google Scholar
Cross Ref
- C. Lin and S. Chang. 2001. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circ. Syst. Vid. Technol. 11, 2 (2001), 153--168.Google Scholar
Digital Library
- Z. Tang, F. Yang, L. Huang, and X. Zhang. 2014. Robust image hashing with dominant DCT coefficients. Optik-Int. J. Light Electron Optics 125, 18 (2014), 5102--5107.Google Scholar
Cross Ref
- Z. Tang, X. Li, X. Zhang, S. Zhang, and Y. Dai. 2018. Image hashing with color vector angle. Neurocomputing 308 (2018), 147--158.Google Scholar
Digital Library
- C. Yan, C. Pun, and X. Yuan. 2016. Quaternion-based image hashing for adaptive tampering localization. IEEE Trans. Inform. Forens. Secur. 11, 12 (2016), 2664--2677.Google Scholar
Cross Ref
- C. Yan, C. Pun, and X. Yuan. 2016. Multi-scale image hashing using adaptive local feature extraction for robust tampering detection. Sig. Proc. 121 (2016), 1--16.Google Scholar
Digital Library
- X. Lv and Z. Wang. 2009. An extended image hashing concept: Content-based fingerprinting using FJLT. EURASIP J. Inform. Sec. 1 (2009), 1--16.Google Scholar
Cross Ref
- J. Song, H. Zhang, X. Li, L. Gao, M. Wang, and R. Hong. 2018. Self-supervised video hashing with hierarchical binary auto-encoder. IEEE Trans. Image Proc. 27, 7 (2018), 3210--3221.Google Scholar
Cross Ref
- J. Song, L. Gao, L. Liu, X. Zhu, and N. Sebe. 2018. Quantization-based hashing: A general framework for scalable image and video retrieval. Pattern Recog. 75 (2018), 175--187.Google Scholar
Digital Library
- X. Liu, Z. Li, C. Deng, and D. Tao. 2017. Distributed adaptive binary quantization for fast nearest neighbor search. IEEE Trans. Image Proc. 26, 11 (2017), 5324--5336.Google Scholar
Digital Library
- W. Kang, W. Li, and Z. Zhou. 2016. Column sampling based discrete supervised hashing. In Proceedings of the AAAI Conference on Artificial Intelligence. 1230--1236.Google Scholar
- X. Wang, L. Gao, P. Wang, X. Sun, and X. Liu. 2018. Two-stream 3D convNet fusion for action recognition in videos with arbitrary size and length. IEEE Trans. Multimedia 20, 3 (2018), 634--644.Google Scholar
Digital Library
- X. Wang, L. Gao, J. Song, and H. Shen. 2017. Beyond frame-level CNN: Saliency-aware 3D CNN with LSTM for video action recognition. IEEE Sig. Proc. Lett. 24, 4 (2017), 510--514.Google Scholar
Cross Ref
- F. Shen, X. Gao, L. Liu, Y. Yang, and H. Shen. 2017. Deep asymmetric pairwise hashing. In Proceedings of the ACM International Conference on Multimedia. 1522--1530.Google Scholar
- C. Deng, Z. Chen, X. Liu, X. Gao, and D. Tao. 2018. Triplet-based deep hashing network for cross-modal retrieval. IEEE Trans. Image Proc. 27, 8 (2018), 3893--3903.Google Scholar
Cross Ref
- Z. Tang, X. Li, J. Song, M. Wei, and X. Zhang. 2015. Colour space selection in image hashing: An experimental study. IETE Tech. Rev. 34, 4 (2017), 440--447.Google Scholar
Cross Ref
- R. C. Gonzalez and R. E. Woods. 2007. Digital Image Processing (3rd ed.). Prentice Hall.Google Scholar
- M. K. Hu. 1962. Visual pattern recognition by moment invariants. IRE Trans. Inform. Theor. 8, 2 (1962), 179--187.Google Scholar
Cross Ref
- Usc-Sipi Image Database. Retrieved from: http://sipi.usc.edu/database/.Google Scholar
- H. Jegou, F. Perronnin, M. Douze, J. Nchez, P. Perez, and C. Schmid. 2012. Aggregating local image descriptors into compact codes. IEEE Trans. Pattern Anal. Machine Intell. 34, 9 (2012), 1704--1716.Google Scholar
Digital Library
- Ground Truth Database. Retrieved from: http://www.cs.washington.edu/reseach/Imagedatabase/groundtruth/.Google Scholar
- F. A. P. Petitcolas. 2000. Watermarking schemes evaluation. IEEE Sig. Proc. Mag. 17, 5 (2000), 58--64.Google Scholar
Cross Ref
- X. Huang, X. Liu, G. Wang, and M. Su. 2016. A robust image hashing with enhanced randomness by using random walk on zigzag blocking. In Proceedings of the IEEE Trustcom/BigDataSE/ISPA Conference. 14--18.Google Scholar
- J. Wang, G. Wiederhold, O. Firschein, and S. Wei. 1998. Content-based image indexing and searching using Daubechies’ wavelets. Int. J. Dig. Lib. 1, 4 (1998), 311--328.Google Scholar
Cross Ref
- A. Turpin and F. Scholer. 2006. User performance versus precision measures for simple search tasks. In Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval. 11--18.Google Scholar
- Z. Zhou, Y. Wang, Q. Wu, C. Yang, and X. Sun. 2017. Effective and efficient global context verification for image copy detection. IEEE Trans. Inform. Forens. Secur. 12, 1 (2017), 48--63.Google Scholar
Digital Library
- J. Hsiao, C. Chen, L. Chien, and M. Chen. 2007. A new approach to image copy detection based on extended feature sets. IEEE Trans. Image Proc. 16, 8 (2007), 2069--2079.Google Scholar
Digital Library
- H. Ling, H. Cheng, Q. Ma, F. Zou, and W. Yan. 2012. Efficient image copy detection using multiscale fingerprints. IEEE Multimedia 19, 1 (2012), 60--69.Google Scholar
Digital Library
- C. I. Podilchuk and E. J. Delp. 2001. Digital watermarking: Algorithms and applications. IEEE Sig. Proc. Mag. 18, 4 (2001), 33--46.Google Scholar
Cross Ref
- C. Kim and Gordo. 2003. Content-based image copy detection. Sig. Proc. Image Commun. 18, 3 (2003), 169--184.Google Scholar
Cross Ref
- A. Gordo, F. Perronnin, Y. Gong, and S. Lazebnik. 2014. Asymmetric distances for binary embeddings. IEEE Trans. Pattern Anal. Mach. Intell. 36, 1 (2014), 33--47.Google Scholar
Digital Library
Index Terms
Efficient Image Hashing with Geometric Invariant Vector Distance for Copy Detection
Recommendations
Robust Color Image Watermarking Using Geometric Invariant Quaternion Polar Harmonic Transform
It is a challenging work to design a robust color image watermarking scheme against geometric distortions. Moments and moment invariants have become a powerful tool in robust image watermarking owing to their image description capability and geometric ...
Fourier-Mellin transform for Robust Image Hashing
EST '13: Proceedings of the 2013 Fourth International Conference on Emerging Security TechnologiesThis paper proposes a new perceptual image hashing technique based on the Fourier-Mellin Transform (FMT). The idea consists of exploiting the invariance property of the FMT to extract robust hashes using overlapping blocks in the transform domain. To ...
Content Based Image Hashing Robust to Geometric Transformations
ISECS '09: Proceedings of the 2009 Second International Symposium on Electronic Commerce and Security - Volume 02An image hashing provides a compact representation of an image that can be used for authenticating that image. This paper presents a new approach for generating an image hashing that is resilient to content-preserving modifications and at the same time, ...






Comments