Rihamark: Perceptual image hash benchmarking

被引:13
|
作者
Zauner, Christoph [1 ]
Steinebach, Martin [2 ]
Hermann, Eckehard [1 ]
机构
[1] Upper Austria Univ Appl Sci, Campus Hagenberg, Dept Secure Informat Syst, Campus Hagenberg, Hagenberg, Austria
[2] Fraunhofer Inst Secure Informat Technol, Darmstadt, Germany
关键词
Perceptual image hash; robust image hash; image fingerprint; benchmarking; evaluation;
D O I
10.1117/12.876617
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We identify which hash function has the best characteristics for various applications. In some of those the computation speed may be the most important, in others the ability to distinguish similar images, and sometimes the robustness of the hash against attacks is the primary goal. We compare the hash functions and provide test results. The block mean value based image hash function outperforms the other hash functions in terms of speed. The discrete cosine transform (DCT) based image hash function is the slowest. Although the Marr-Hildreth operator based image hash function is neither the fastest nor the most robust, it offers by far the best discriminative abilities. Interestingly enough, the performance in terms of discriminative ability does not depend on the content of the images. That is, no matter whether the visual appearance of the images compared was very similar or not, the performance of the particular hash function did not change significantly. Different image operations, like horizontal flipping, rotating or resizing, were used to test the robustness of the image hash functions. An interesting result is that none of the tested image hash function is robust against flipping an image horizontally.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Deep Perceptual Hash Based on Hash Center for Image Copyright Protection
    Sun, Xiaohan
    Zhou, Jiting
    [J]. IEEE ACCESS, 2022, 10 : 120551 - 120562
  • [2] Attacking some perceptual image hash algorithms
    Weng, Li
    Preneel, Bart
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 879 - 882
  • [3] Image alignment based perceptual image hash for content authentication
    Wang, Xiaofeng
    Zhou, Xiaorui
    Zhang, Qian
    Xu, Bingchao
    Xue, Jianru
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2020, 80
  • [4] Fast perceptual image hash based on cascade algorithm
    Ruchay, Alexey
    Kober, Vitaly
    Yavtushenko, Evgeniya
    [J]. APPLICATIONS OF DIGITAL IMAGE PROCESSING XL, 2017, 10396
  • [5] Research and Implementation of Perceptual Hash Algorithm for Image Retrieval
    Zhu, Wenlie
    Chang, Jing
    [J]. ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS III, 2019, 2073
  • [6] A Secure Perceptual Hash Algorithm for Image Content Authentication
    Weng, Li
    Preneel, Bart
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 108 - 121
  • [7] A Novel Perceptual Hash Algorithm for Multispectral Image Authentication
    Ding, Kaimeng
    Chen, Shiping
    Meng, Fan
    [J]. ALGORITHMS, 2018, 11 (01)
  • [8] Robust Perceptual Image Hash Using Gabor Filters
    Wang, Lina
    Jiang, Xiaqiu
    Hu, Donghui
    Ye, Dengpan
    Lian, Shiguo
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 53 - +
  • [9] Using Image Sensor PUF as Root of Trust for Birthmarking of Perceptual Image Hash
    Cao, Yuan
    Zhang, Le
    Chang, Chip-Hong
    [J]. PROCEEDINGS OF THE 2016 IEEE ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST 2016), 2016,
  • [10] Fast texture and structure image reconstruction using the perceptual hash
    Voronin, V. V.
    Marchuk, V. I.
    Frantc, V. A.
    Egiazarian, K. O.
    [J]. IMAGE PROCESSING: ALGORITHMS AND SYSTEMS XI, 2013, 8655