Fast Johnson-Lindenstrauss Transform for Robust and Secure Image Hashing

被引:0
|
作者
Lv, Xudong [1 ]
Wang, Z. Jane [1 ]
机构
[1] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V5Z 1M9, Canada
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Dimension reduction based techniques, such as singular value decomposition (SVD) and non-negative matrix factorization (NMF), have been proved to provide excellent performance for robust and secure image hashing by retaining the essential features of the original image matrix while preventing intentional attacks. In this paper, we introduce a recently proposed low-distortion, dimension reduction technique, referred as Fast Johnson-Lindenstrauss Transform (FJLT), and propose the use of FJLT for image hashing. FJLT shares the low-distortion characteristics of a random projection but requires a much lower complexity. These two desirable properties make it suitable for image hashing. Our experiment results show that the proposed FJLT-based hash yields good robustness under a wide range of attacks. Furthermore, the influence of secret key on the proposed hashing algorithm is evaluated by receiver operating characteristics (ROC) graph, revealing the efficiency of the proposed approach.
引用
下载
收藏
页码:729 / 733
页数:5
相关论文
共 50 条
  • [1] TOWARDS AUTOMATED IMAGE HASHING BASED ON THE FAST JOHNSON-LINDENSTRAUSS TRANSFORM (FJLT)
    Fatourechi, Mehrdad
    Lv, Xudong
    Wang, Z. Jane
    Ward, Rabab K.
    2009 FIRST IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2009, : 121 - 125
  • [2] An Almost Optimal Unrestricted Fast Johnson-Lindenstrauss Transform
    Ailon, Nir
    Liberty, Edo
    ACM TRANSACTIONS ON ALGORITHMS, 2013, 9 (03)
  • [3] An Almost Optimal Unrestricted Fast Johnson-Lindenstrauss Transform
    Ailon, Nir
    Liberty, Edo
    PROCEEDINGS OF THE TWENTY-SECOND ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2011, : 185 - 191
  • [4] THE FAST JOHNSON-LINDENSTRAUSS TRANSFORM AND APPROXIMATE NEAREST NEIGHBORS
    Ailon, Nir
    Chazelle, Bernard
    SIAM JOURNAL ON COMPUTING, 2009, 39 (01) : 302 - 322
  • [5] A Sparse Johnson-Lindenstrauss Transform
    Dasgupta, Anirban
    Kumar, Ravi
    Sarlos, Tamas
    STOC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2010, : 341 - 350
  • [6] Guarantees for the Kronecker fast Johnson-Lindenstrauss transform using a coherence and sampling argument
    Malik, Osman Asif
    Becker, Stephen
    LINEAR ALGEBRA AND ITS APPLICATIONS, 2020, 602 : 120 - 137
  • [7] The Johnson-Lindenstrauss Transform Itself Preserves Differential Privacy
    Blocki, Jeremiah
    Blum, Avrim
    Datta, Anupam
    Sheffet, Or
    2012 IEEE 53RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2012, : 410 - 419
  • [8] Privacy Preserving Collaborative Filtering via the Johnson-Lindenstrauss Transform
    Yang, Mengmeng
    Zhu, Tianqing
    Ma, Lichuan
    Xiang, Yang
    Zhou, Wanlei
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 417 - 424
  • [9] Differential Private POI Queries via Johnson-Lindenstrauss Transform
    Yang, Mengmeng
    Zhu, Tianqing
    Liu, Bo
    Xiang, Yang
    Zhou, Wanlei
    IEEE ACCESS, 2018, 6 : 29685 - 29699
  • [10] On variants of the Johnson-Lindenstrauss lemma
    Matousek, Jiri
    RANDOM STRUCTURES & ALGORITHMS, 2008, 33 (02) : 142 - 156