Robust perceptual image hashing via matrix invariants

被引:185
|
作者
Kozat, SS [1 ]
Venkatesan, R [1 ]
Mihçak, MK [1 ]
机构
[1] Univ Illinois, Coordinated Sci Lab, Urbana, IL 61801 USA
关键词
D O I
10.1109/ICIP.2004.1421855
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper we suggest viewing images (as well as attacks oil them) as a sequence of linear operators and propose novel hashing algorithms employing transforms that are based oil matrix invariants. To derive this sequence. we simply cover a two dimensional representation of an image by a Sequence of (possibly overlapping) rectangles R-i whose sizes and locations are chosen randomly(1) from a Suitable distribution. The restriction of the image (representation) to each R-i gives rise to a matrix A(i). The fact that A(i)'s will overlap and are random. makes the sequence (respectively) a redundant and non-standard representation of images, but is crucial for our purposes. Our algorithms first construct a secondary image, derived from input image by pseudo-randomly extracting features that approximately capture semi-global geometric characteristics. From the secondary image (which does not perceptually resemble the input), we further extract the final features which call be used as a hash value (and call be further Suitably quantized). In this paper, We use spectral matrix invariants as embodied by Singular Value Decomposition. Surprisingly. formation of the secondary image turns Out he quite important since it not only introduces further robustness (i.e. resistance against standard signal processing transformations), but also enhances the Security properties (i.e. resistance against intentional attacks). Indeed, Our experiments reveal that our hashing algorithms extract most of the geometric information from the images and hence are robust to severe perturbations (e.g. up to %50 cropping by area with 20 degree rotations) on images while avoiding misclassification. Our methods are general enough to yield a watermark embedding scheme, which will be studied in another paper.
引用
收藏
页码:3443 / 3446
页数:4
相关论文
共 50 条
  • [1] Robust perceptual color image hashing using randomized hypercomplex matrix factorizations
    Ghouti, Lahouari
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (15) : 19895 - 19929
  • [2] Robust perceptual color image hashing using randomized hypercomplex matrix factorizations
    Lahouari Ghouti
    [J]. Multimedia Tools and Applications, 2018, 77 : 19895 - 19929
  • [3] Robust image hashing using invariants of Tchebichef moments
    Chen, Yongchang
    Yu, Weiyu
    Feng, Jiuchao
    [J]. OPTIK, 2014, 125 (19): : 5582 - 5587
  • [4] Robust image hashing via non-negative matrix factorizations
    Monga, Vishal
    Mihcak, M. Kivanc
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-13, 2006, : 1473 - 1476
  • [5] Robust perceptual image hashing using feature points
    Monga, V
    Evans, RL
    [J]. ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 677 - 680
  • [6] Robust perceptual fingerprint image hashing: a comparative study
    Birouk, Wafa
    Lahoulou, Atidel
    Melit, Ali
    Bouridane, Ahmed
    [J]. INTERNATIONAL JOURNAL OF BIOMETRICS, 2023, 15 (01) : 59 - 77
  • [7] Robust perceptual image hashing using SIFT and SVD
    Singh, Kh. Motilal
    Neelima, Arambam
    Tuithung, T.
    Singh, Kh. Manglem
    [J]. CURRENT SCIENCE, 2019, 117 (08): : 1340 - 1344
  • [8] Robust and secure image hashing via non-negative matrix factorizations
    Monga, Vishal
    Mihcak, M. Kivanc
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (03) : 376 - 390
  • [9] Robust perceptual image hashing using fuzzy color histogram
    Gharde, Nilesh Dilipkumar
    Thounaojam, Dalton Meitei
    Soni, Badal
    Biswas, Saroj Kr.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (23) : 30815 - 30840
  • [10] Robust perceptual image hashing using fuzzy color histogram
    Nilesh Dilipkumar Gharde
    Dalton Meitei Thounaojam
    Badal Soni
    Saroj Kr. Biswas
    [J]. Multimedia Tools and Applications, 2018, 77 : 30815 - 30840