[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3240508.3240690acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
research-article

Robustness and Discrimination Oriented Hashing Combining Texture and Invariant Vector Distance

Published: 15 October 2018 Publication History

Abstract

Image hashing is a novel technology of multimedia processing with wide applications. Robustness and discrimination are two of the most important objectives of image hashing. Different from existing hashing methods without a good balance with respect to robustness and discrimination, which largely restrict the application in image retrieval and copy detection, i.e., seriously reducing the retrieval accuracy of similar images, we propose a new hashing method which can preserve two kinds of complementary features (global feature via texture and local feature via DCT coefficients) to achieve a good balance between robustness and discrimination. Specifically, the statistical characteristics in gray-level co-occurrence matrix (GLCM) are extracted to well reveal the texture changes of an image, which is of great benefit to improve the perceptual robustness. Then, the normalized image is divided into image blocks, and the dominant DCT coefficients in the first row/column are selected to form a feature matrix. The Euclidean distance between vectors of the feature matrix is invariant to commonly-used digital operations, which helps make hash more compact. Various experiments show that our approach achieves a better balance between robustness and discrimination than the state-of-the-art algorithms.

References

[1]
F. Balado, N. Hurley, E. Mccarthy, and G. Silvestre. 2007. Performance analysis of robust audio hashing. IEEE Transactions on Information Forensics and Security 2, 2 (2007), 254--266.
[2]
S. Battiato, G. Farinella, E. Messina, and G. Puglisi. 2011. A robust forensic hash component for image alignment. In Proceedings of International Conference on Image Analysis and Processing. 473--483.
[3]
S. Battiato, G. Farinella, E. Messina, and G. Puglisi. 2012. Robust image alignment for tampering detection. IEEE Transactions on Information Forensics and Security 7, 4 (2012), 1105--1117.
[4]
Y. Chen, H. Zhang, X. Zhang, and R. Liu. 2017. Regularized seminonnegative matrix factorization for hashing. IEEE Transactions on Multimedia 26, 6 (2017), 1--13.
[5]
R. Davarzani, S. Mozaffari, and K. Yaghmaie. 2016. Perceptual image hashing using center-symmetric local binary patterns. Multimedia Tools and Applications 75, 8 (2016), 4639--4667.
[6]
T. Fawcett. 2006. An introduction to ROC analysis. Pattern Recognition Letters 27, 8 (2006), 861--874.
[7]
E. Hassan, S. Chaudhury, and M. Gopal. 2012. Feature combination in kernel space for distance based image hashing. IEEE Transactions on Multimedia 14, 4 (2012), 1179--1195.
[8]
IEEE. 2008. IEEE standard for floating-point arithmetic. IEEE Std (2008), 1--70.
[9]
H. Jegou, F. Perronnin, M. Douze, J. Nchez, P. Perez, and C. Schmid. 2012. Aggregating local image descriptors into compact codes. IEEE Transactions Pattern Analysis and Machine Intelligence 34, 9 (2012), 1704--1716.
[10]
F. Khelifi and J. Jiang. 2010. Perceptual image hashing based on virtual watermark detection. IEEE Transactions on Image Processing 19, 4 (2010), 981--994.
[11]
S. Kozat, R. Venkatesan, and M. Mihcak. 2004. Robust perceptual image hashing via matrix invariants. In Proceedings of IEEE International Conference on Image Processing. 3443--3446.
[12]
Y. Kuo, K. Chen, C. Chiang, and W. Hsu. 2009. Query expansion for hash-based image object retrieval. In Proceedings of ACM International Conference on Multimedia. 65--74.
[13]
Y. Li, Z. Lu, C. Zhu, and X. Niu. 2012. Robust image hashing based on random gabor filtering and dithered lattice vector quantization. IEEE Transactions on Image Processing 21, 4 (2012), 1963--1980.
[14]
C. Lin and S. Chang. 2001. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Transactions on Circuits and Systems for Video Technology 11, 2 (2001), 153--168.
[15]
Q. Liu, R. Safavi-Naini, and N. P. Sheppard. 2003. Digital rights management for content distribution. In Proceedings of the Australasian Information Security Workshop on ACSW Frontiers. 49--58.
[16]
W. Lu and M. Wu. 2010. Multimedia forensic hash based on visual words. In Proceedings of IEEE International Conference on Image Processing. 989--992.
[17]
X. Lv and Z. Wang. 2012. Perceptual image hashing based on shape contexts and local feature points. IEEE Transactions on Information Forensics and Security 7, 3 (2012), 1081--1093.
[18]
A. Manno-Kovacs. 2016. Content based image retrieval using salient orientation histograms. In Proceedings of IEEE International Conference on Image Processing. 2480--2484.
[19]
M. Mishra and F. L. M. C. Adhikary. 2013. Digital image tamper detection techniques - a comprehensive study. Computer Science 2, 1 (2013), 1--12.
[20]
V. Monga, A. Banerjee, and B. L. Evans. 2006. A clustering based approach to perceptual image hashing. IEEE Transactions on Information Forensics and Security 1, 1 (2006), 68--79.
[21]
V. Monga and B. Evans. 2006. Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Transactions on Image Processing 15, 11 (2006), 3452--3465.
[22]
V. Monga and M. Mihcak. 2007. Robust and secure image hashing via non-negative matrix factorizations. IEEE Transactions on Information Forensics and Security 2, 3 (2007), 376--390.
[23]
Y. Ou and K. Rhee. 2010. A key-dependent secure image hashing scheme by using Radon transform. In Proceedings of International Symposium on Intelligent Signal Processing and Communication Systems. 595--598.
[24]
F. Petitcolas. 2000. Watermarking schemes evaluation. IEEE Signal Processing Magazine 17, 5 (2000), 58--64.
[25]
A. Rampun, H. Strange, and R. Zwiggelaar. 2013. Texture segmentation using different orientations of GLCM features. In Proceedings of International Conference on Computer Vision. 1--8.
[26]
G. Schaefer. 2003. UCID: an uncompressed color image database. In Proceedings of Storage and Retrieval Methods and Applications for Multimedia. 472--480.
[27]
A. Swaminathan, Y. Mao, and M. Wu. 2006. Robust and secure image hashing. IEEE Transactions on Information Forensics and Security 1, 2 (2006), 215--230.
[28]
Z. Tang, L. Huang, X. Zhang, and H. Lao. 2016. Robust image hashing based on color vector angle and Canny operator. AEU - International Journal of Electronics and Communications 70, 6 (2016), 833 -- 841.
[29]
Z. Tang, Z. Huang, X. Zhang, and H. Lao. 2017. Robust image hashing with multidimensional scaling. Signal Processing 137 (2017), 240--250.
[30]
Z. Tang, H. Lao, X. Zhang, and K. Liu. 2016. Robust image hashing via DCT and LLE. Computers & Security 62 (2016), 133--148.
[31]
Z. Tang, L. Ruan, C. Qin, X. Zhang, and C. Yu. 2015. Robust image hashing with embedding vector variance of LLE. Digital Signal Processing 43 (2015), 17--27.
[32]
Z. Tang, X. Zhang, and S. Zhang. 2014. Robust perceptual image hashing based on ring partition and NMF. IEEE Transactions on Knowledge and Data Engineering 26, 3 (2014), 711--724.
[33]
G. Trigeorgis, K. Bousmalis, S. Zafeiriou, and B. Schuller. 2014. A deep semi-NMF model for learning hidden representations. In Proceedings of International Conference on Machine Learning. 1692--1700.
[34]
R. Venkatesan, S. Koon, M. Jakubowski, and P. Moulin. 2000. Robust image hashing. In Proceedings of IEEE International Conference on Image Processing. 664--666.
[35]
X. Wang, K. Pang, X. Zhou, Y. Zhou, L. Li, and J. Xue. 2015. A visual model-based perceptual image hash for content authentication. IEEE Transactions on Information Forensics and Security 10, 7 (2015), 1336--1349.
[36]
C. Yan, C. Pun, and X. Yuan. 2016. Quaternion-based image hashing for adaptive tampering localization. IEEE Transactions on Information Forensics and Security 11, 12 (2016), 2664--2677.
[37]
Y. Zhao, S. Wang, X. Zhang, and H. Yao. 2013. Robust hashing for image authentication using zernike moments and local features. IEEE Transactions on Information Forensics and Security 8, 1 (2013), 55--63.
[38]
X. Zhu, X. Li, S. Zhang, Z. Xu, L. Yu, and C. Wang. 2017. Graph PCA hashing for similarity search. IEEE Transactions on Multimedia 19, 8 (2017), 2033--2044.
[39]
F. Zou, Y. Chen, J. Song, K. Zhou, Y. Yang, and N. Sebe. 2015. Compact image fingerprint via multiple kernel hashing. IEEE Transactions on Multimedia 17, 7 (2015), 1006--1018.

Cited By

View all
  • (2024)Robust Image Hashing via CP Decomposition and DCT for Copy DetectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/365011220:7(1-22)Online publication date: 1-Mar-2024
  • (2024)Perceptual Video Hashing With Secure Anti-Noise Model for Social Video RetrievalIEEE Internet of Things Journal10.1109/JIOT.2023.329360911:2(2648-2664)Online publication date: 15-Jan-2024
  • (2024)A robust self-supervised image hashing method for content identification with forensic detection of content-preserving manipulationsNeural Networks10.1016/j.neunet.2024.106357177:COnline publication date: 1-Sep-2024
  • Show More Cited By

Index Terms

  1. Robustness and Discrimination Oriented Hashing Combining Texture and Invariant Vector Distance

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MM '18: Proceedings of the 26th ACM international conference on Multimedia
      October 2018
      2167 pages
      ISBN:9781450356657
      DOI:10.1145/3240508
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 15 October 2018

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. dominant dct coefficients
      2. image hashing
      3. invariant vector distance
      4. robustness and discrimination

      Qualifiers

      • Research-article

      Conference

      MM '18
      Sponsor:
      MM '18: ACM Multimedia Conference
      October 22 - 26, 2018
      Seoul, Republic of Korea

      Acceptance Rates

      MM '18 Paper Acceptance Rate 209 of 757 submissions, 28%;
      Overall Acceptance Rate 2,145 of 8,556 submissions, 25%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)18
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 12 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Robust Image Hashing via CP Decomposition and DCT for Copy DetectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/365011220:7(1-22)Online publication date: 1-Mar-2024
      • (2024)Perceptual Video Hashing With Secure Anti-Noise Model for Social Video RetrievalIEEE Internet of Things Journal10.1109/JIOT.2023.329360911:2(2648-2664)Online publication date: 15-Jan-2024
      • (2024)A robust self-supervised image hashing method for content identification with forensic detection of content-preserving manipulationsNeural Networks10.1016/j.neunet.2024.106357177:COnline publication date: 1-Sep-2024
      • (2024)Pyram: a robust and attack-resistant perceptual image hashing using pyramid histogram of gradientsInternational Journal of Information Technology10.1007/s41870-024-02019-116:8(5331-5349)Online publication date: 27-Jul-2024
      • (2024)A generalized detection framework for covert timing channels based on perceptual hashingTransactions on Emerging Telecommunications Technologies10.1002/ett.497835:5Online publication date: 9-May-2024
      • (2023)Robust Hashing via Global and Local Invariant Features for Image Copy DetectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/360023420:1(1-22)Online publication date: 27-May-2023
      • (2023)Efficient Hashing Method Using 2D-2D PCA for Image Copy DetectionIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2021.313118835:4(3765-3778)Online publication date: 1-Apr-2023
      • (2023)Perceptual Image Hashing With Locality Preserving Projection for Copy DetectionIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.313616320:1(463-477)Online publication date: 1-Jan-2023
      • (2023)IntroductionImage and Video Color Editing10.1007/978-3-031-26030-8_1(1-8)Online publication date: 21-Mar-2023
      • (2022)Improved Mask R-CNN Combined with Otsu Preprocessing for Rice Panicle Detection and SegmentationApplied Sciences10.3390/app12221170112:22(11701)Online publication date: 17-Nov-2022
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media