[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Pyram: a robust and attack-resistant perceptual image hashing using pyramid histogram of gradients

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

Perceptual image hashing is a significant and time-effective method for recognizing images within extensive databases, focusing on achieving two key objectives: robustness and discrimination. The right balance between these two aspects remains a significant challenge in contemporary hashing research. Moreover, many image hashing algorithms face limitations when performing satisfactorily against specific image processing attacks, such as rotation. With this in mind, a rotation correction based perceptual image hashing system is designed called as Pyram using a pyramid histogram of gradients (PHOG). The system exploits the properties of log polar transform for invariance to geometric distortions and then the PHOG in blocks for generating the final hash vector. In computing hash similarity, the correlation is employed as the metric of choice. The trade-off between robustness and discrimination is evaluated on benchmark databases against single and double attacks. Furthermore, the comprehensive experiments further confirm that the PHOG method consistently delivers better accuracy than its state-of-the-art methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Fig. 2
Algorithm 2
Fig. 3
Algorithm 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Availability of data and materials

The datasets used to support the findings of this study are available from the public repositories mentioned in the manuscript.

References

  1. Huang Y, Zhang J, Pan L, Xiang Y (2018) Privacy protection in interactive content based image retrieval. IEEE Trans Depend Secur Comput 17(3):595–607

    Google Scholar 

  2. Yuan X, Wang X, Wang C, Squicciarini AC, Ren K (2016) Towards privacy-preserving and practical image-centric social discovery. IEEE Trans Depend Secur Comput 15(5):868–882

    Article  Google Scholar 

  3. Paul M, Thakuria AJ, Karsh RK, Talukdar FA (2021) Robust color image hashing using convolutional stacked denoising auto-encoders for image authentication. Neur Comput Appl 33:13317–13331

    Article  Google Scholar 

  4. Agarwal M (2023) Neighborhood ternary co-occurrence for natural and texture image retrieval. Int J Inform Technol 15(4):1999–2006

    Google Scholar 

  5. Malik S, Reddlapalli RK (2019) Histogram and entropy based digital image watermarking scheme. Int J Inform Technol 11(2):373–379

    Google Scholar 

  6. Hamid Y, Elyassami S, Gulzar Y, Balasaraswathi VR, Habuza T, Wani S (2023) An improvised CNN model for fake image detection. Int J Inform Technol 15(1):5–15

    Google Scholar 

  7. Jintanachaiwat W, Siriborvornratanakul T (2023) Vision-based image similarity measurement for image search similarity. Int J Inform Technol 15(8):4125–4130

    Google Scholar 

  8. Srinivasan S, Rajakumar K (2023) Hyperspectral image classification using efficient Net-b4 with search and rescue operation algorithm. Int J Inform Technol 15(3):1473–1479

    Google Scholar 

  9. Schneider M, Chang S-F (1996) A robust content based digital signature for image authentication. In: Proceedings of 3rd IEEE International Conference on Image Processing, vol. 3, pp. 227–230

  10. Swaminathan A, Mao Y, Wu M (2006) Robust and secure image hashing. IEEE Trans Inform Forens Secur 1(2):215–230

    Article  Google Scholar 

  11. Tang Z, Zhang X, Zhang S (2013) Robust perceptual image hashing based on ring partition and NMF. IEEE Trans Knowl Data Eng 26(3):711–724

    Article  MathSciNet  Google Scholar 

  12. Lv X, Wang ZJ (2012) Perceptual image hashing based on shape contexts and local feature points. IEEE Trans Inform Forens Secur 7(3):1081–1093

    Article  Google Scholar 

  13. Roy M, Thounaojam DM, Pal S (2023) Pih-mscm: a modified spiking cortical model for perceptual image hashing and its application to copy detection. Multimedia Tools Appl 1:22

    Google Scholar 

  14. Huang Z, Liu S (2018) Robustness and discrimination oriented hashing combining texture and invariant vector distance. In: Proceedings of the 26th ACM International Conference on Multimedia, pp. 1389–1397

  15. Roy M, Thounaojam DM, Pal S (2023) Various approaches to perceptual image hashing systems-a survey. In: 2023 International Conference on Intelligent Systems, Advanced Computing and Communication (ISACC), pp. 1–9. IEEE

  16. Ahmad K, Sahu M, Shrivastava M, Rizvi MA, Jain V (2020) An efficient image retrieval tool: query based image management system. Int J Inform Technol 12(1):103–111

    Google Scholar 

  17. Tang Z, Zhang X, Li X, Zhang S (2015) Robust image hashing with ring partition and invariant vector distance. IEEE Trans Inform Forens Secur 11(1):200–214

    Article  Google Scholar 

  18. Karsh RK, Saikia A, Laskar RH (2018) Image authentication based on robust image hashing with geometric correction. Multimedia Tools Appl 77:25409–25429

    Article  Google Scholar 

  19. Roy M, Thounaojam DM, Pal S (2023) A perceptual hash based blind-watermarking scheme for image authentication. Expert Syst Appl 227:120237

    Article  Google Scholar 

  20. Nesakumari GR (2022) Image retrieval system based on multi feature extraction and its performance assessment. Int J Inform Technol 14(2):1161–1173

    Google Scholar 

  21. Ouyang J, Coatrieux G, Shu H (2015) Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform. Digital Signal Process 41:98–109

    Article  Google Scholar 

  22. Tang Z, Zhang X, Li X, Zhang S (2015) Robust image hashing with ring partition and invariant vector distance. IEEE Trans Inform Forens Secur 11(1):200–214

    Article  Google Scholar 

  23. TangZL R et al (2015) Robust image hashing with embedding vector variance of LLE. Digital Signal Process 43:17–27

    Article  Google Scholar 

  24. Yan C-P, Pun C-M, Yuan X-C (2016) Quaternion-based image hashing for adaptive tampering localization. IEEE Trans Inform Forens Secur 11(12):2664–2677

    Article  Google Scholar 

  25. Liu H, Xiao D, Xiao Y, Zhang Y (2016) Robust image hashing with tampering recovery capability via low-rank and sparse representation. Multimedia Tools Appl 75:7681–7696

    Article  Google Scholar 

  26. Abbas SQ, Ahmed F, Živić N, Ur-Rehman O (2016) Perceptual image hashing using svd based noise resistant local binary pattern. In: 2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 401–407. IEEE

  27. Yan C-P, Pun C-M, Yuan X-C (2016) Multi-scale image hashing using adaptive local feature extraction for robust tampering detection. Signal Process 121:1–16

    Article  Google Scholar 

  28. Qin C, Chen X, Dong J, Zhang X (2016) Perceptual image hashing with selective sampling for salient structure features. Displays 45:26–37

    Article  Google Scholar 

  29. Tang Z, Huang L, Zhang X, Lao H (2016) Robust image hashing based on color vector angle and canny operator. AEU Int J Electron Commun 70(6):833–841

    Article  Google Scholar 

  30. Ouyang J, Wen X, Liu J, Chen J (2016) Robust hashing based on quaternion zernike moments for image authentication. ACM Trans Multimedia Comput Commun Appl (TOMM) 12(4s):1–13

    Article  Google Scholar 

  31. Srivastava M, Siddiqui J, Ali MA (2016) Robust image hashing based on statistical features for copy detection. In: 2016 IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering (UPCON), pp. 490–495. IEEE

  32. Yan C-P, Pun C-M (2017) Multi-scale difference map fusion for tamper localization using binary ranking hashing. IEEE Trans Inform Forens Secur 12(9):2144–2158

    Article  Google Scholar 

  33. Pun C-M, Yan C-P, Yuan X-C (2018) Robust image hashing using progressive feature selection for tampering detection. Multimedia Tools Appl 77:11609–11633

    Article  Google Scholar 

  34. Huang Z, Liu S (2018) Robustness and discrimination oriented hashing combining texture and invariant vector distance. In: Proceedings of the 26th ACM International Conference on Multimedia, pp. 1389–1397

  35. Qin C, Chen X, Luo X, Zhang X, Sun X (2018) Perceptual image hashing via dual-cross pattern encoding and salient structure detection. Inform Sci 423:284–302

    Article  MathSciNet  Google Scholar 

  36. Qin C, Sun M, Chang C-C (2018) Perceptual hashing for color images based on hybrid extraction of structural features. Signal Process 142:194–205

    Article  Google Scholar 

  37. Hosny KM, Khedr YM, Khedr WI, Mohamed ER (2018) Robust image hashing using exact gaussian-hermite moments. IET Image Process 12(12):2178–2185

    Article  Google Scholar 

  38. Wang P, Jiang A, Cao Y, Gao Y, Tan R, He H, Zhou M (2018) Robust image hashing based on hybrid approach of scale-invariant feature transform and local binary patterns. In: 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP), pp. 1–5. IEEE

  39. Qin C, Hu Y, Yao H, Duan X, Gao L (2019) Perceptual image hashing based on weber local binary pattern and color angle representation. IEEE Access 7:45460–45471

    Article  Google Scholar 

  40. Roy M, Thounaojam DM, Pal S (2022) Perceptual hashing scheme using kaze feature descriptors for combinatorial manipulations. Multimedia Tools Appl 81(20):29045–29073. https://doi.org/10.1007/s11042-022-12626-4

    Article  Google Scholar 

  41. Hamid H, Ahmed F, Ahmad J (2020) Robust image hashing scheme using laplacian pyramids. Comput Electric Eng 84:106648. https://doi.org/10.1016/j.compeleceng.2020.106648

    Article  Google Scholar 

  42. Zhao Y, Liu S (2021) Robust image hashing based on cool and warm hue and space angle. Secur Commun Network 2021:1–13. https://doi.org/10.1155/2021/3803481

    Article  Google Scholar 

  43. Sajjad M, Haq IU, Lloret J, Ding W, Muhammad K (2019) Robust image hashing based efficient authentication for smart industrial environment. IEEE Trans Ind Inform 15(12):6541–6550. https://doi.org/10.1109/TII.2019.2921652

    Article  Google Scholar 

  44. Liu S, Zhao Y (2022) Robust image hashing combining 3D space contour and vector angle features. Comput J. https://doi.org/10.1093/comjnl/bxac127

    Article  Google Scholar 

  45. Lai S, Zhang N (2012) Image hashing via hough transform. In: 2012 46th Annual Conference on Information Sciences and Systems (CISS), pp. 1–4. https://doi.org/10.1109/CISS.2012.6310729

  46. Plesca C, Morogan L (2014) Efficient and robust perceptual hashing using log-polar image representation. In: 2014 10th International Conference on Communications (COMM), pp. 1–6. https://doi.org/10.1109/ICComm.2014.6866755

  47. Venkatesan R, Koon S-M, Jakubowski MH, Moulin P (2000) Robust image hashing. In: Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101), 3, 664–6663. https://doi.org/10.1109/ICIP.2000.899541

  48. Swaminathan A, Mao Y, Wu M (2004) Image hashing resilient to geometric and filtering operations. In: IEEE 6th Workshop on Multimedia Signal Processing, 2004., pp. 355–358. https://doi.org/10.1109/MMSP.2004.1436566

  49. Mao Y, Wu M (2007) Unicity distance of robust image hashing. IEEE Trans Inform Forens Secur 2(3):462–467. https://doi.org/10.1109/TIFS.2007.902260

    Article  MathSciNet  Google Scholar 

  50. Huang Z, Liu S (2020) Perceptual image hashing with texture and invariant vector distance for copy detection, vol. PP, pp. 1–1. https://doi.org/10.1109/TMM.2020.2999188

  51. Ambeth Kumar V (2017) Coalesced global and local feature discrimination for content-based image retrieval. Int J Inform Technol 9(4):431–446

    Google Scholar 

  52. Kanaparthi SK, Raju U (2022) Content based image retrieval on big image data using local and global features. Int J Inform Technol 14(1):49–68

    Google Scholar 

  53. Zhao Y, Yuan X (2020) Perceptual image hashing based on color structure and intensity gradient. In: IEEE Access. 8, 26041–26053. https://doi.org/10.1109/ACCESS.2020.2970757

  54. Lazebnik S, Schmid C, Ponce J (2006) Beyond bags of features: Spatial pyramid matching for recognizing natural scene categories. In: 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’06), 2, 2169–2178. https://doi.org/10.1109/CVPR.2006.68

  55. Li Yn (2015) Robust content fingerprinting algorithm based on sparse coding, 22, 1254–1258. https://doi.org/10.1109/LSP.2015.2395726

  56. Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05), vol. 1, pp. 886–8931. https://doi.org/10.1109/CVPR.2005.177

  57. Weber AG (2018) The USC-SIPI image database version 6. USC-SIPI Report 432:1–24

    Google Scholar 

  58. Petitcolas, F. https://www.petitcolas.net/watermarking/image_database/ (Accessed: 2021 June)

  59. Dataset, C.E.I. https://web.archive.org/web/20210114012713/https://homepages.cae.wisc.edu/ ece533/images/ (Accessed: 2021 June)

  60. Olmos A, Kingdom FA (2004) A biologically inspired algorithm for the recovery of shading and reflectance images. Perception 33(12):1463–1473

    Article  Google Scholar 

  61. Shapiro, L.G. https://imagedatabase.cs.washington.edu/groundtruth/ (Accessed: 2022 June)

  62. Tang Z, Zhang X, Li X, Zhang S (2015) Robust image hashing with ring partition and invariant vector distance. IEEE Trans Inform Forens Secur 11(1):200–214

    Article  Google Scholar 

  63. Singh KM, Neelima A, Tuithung T, Singh KM (2019) Robust perceptual image hashing using sift and svd. Curr Sci 117(8):1340

    Article  Google Scholar 

  64. Khan MF, Monir SM, Naseem I (2021) Robust image hashing based on structural and perceptual features for authentication of color images. Turkish J Electr Eng Comput Sci 29(2):648–662

    Article  Google Scholar 

Download references

Funding

This study has not received any funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dalton Meitei Thounaojam.

Ethics declarations

Conflict of interest

The authors declare that they have no Conflict of interest.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Neog, P.S., Roy, M., Sangale, T. et al. Pyram: a robust and attack-resistant perceptual image hashing using pyramid histogram of gradients. Int. j. inf. tecnol. 16, 5331–5349 (2024). https://doi.org/10.1007/s41870-024-02019-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-024-02019-1

Keywords

Navigation