Learning to Hash for Personalized Image Authentication

被引:16
|
作者
Su, Zhiyong [1 ]
Yao, Liang [1 ]
Mei, Jialin [1 ]
Zhou, Lang [2 ]
Li, Weiqing [3 ]
机构
[1] Nanjing Univ Sci & Technol, Visual Comp Grp, Sch Automat, Nanjing 210094, Peoples R China
[2] Nanjing Univ Finance & Econ, Coll Informat Engn, Nanjing 210023, Peoples R China
[3] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Quantization (signal); Feature extraction; Measurement; Training; Task analysis; Binary codes; Metric learning; supervised quantization; image authentication; image hashing; LMNN; MARGIN NEAREST-NEIGHBOR;
D O I
10.1109/TCSVT.2020.3002146
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper takes a fresh look at the image authentication problem and proposes an alternative framework for personalized authentication based on the hash learning technology. Conventional image authentication methods tend to provide a general authentication framework for all images with the fixed quantization strategy and fixed control parameters determined based on given limited images and attacks. However, they may suffer from more or less misjudgments in practice, not to mention performance degradation when encountering out-of-sample images. Instead of proposing a new feature extraction algorithm, a novel personalized authentication framework which incorporates the distance metric learning technology and supervised quantization strategy to the process of image authentication is proposed in this paper. The tamper detection task is reformulated as a new supervised manipulation classification problem. For each input image, various content-preserving and content-changing samples are generated automatically firstly. Then, feature representations of all samples can be obtained by existing feature extraction methods. After that, a weighted large margin for manipulation classification (WLMMC) scheme is proposed to learn an effective feature mapping space to improve the classification performance between content-changing samples and content-preserving samples. During the quantization stage, a novel supervised personalized quantization strategy (SPQ), which is motivated by the observation that different attacks have different degrees of influence on feature components, is proposed to learn more compact yet discriminative binary codes for each input image. Effectiveness of the proposed framework is qualitatively and quantitatively demonstrated on a variety of images. Extensive experiments show that the proposed framework can significantly improve the authentication performance over the state-of-the-art techniques while achieve more compact hash codes flexibly as required.
引用
收藏
页码:1648 / 1660
页数:13
相关论文
共 50 条
  • [1] Robust image authentication using hash function
    Kobayashi, H
    Kiya, H
    TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : A435 - A438
  • [2] Image alignment based perceptual image hash for content authentication
    Wang, Xiaofeng
    Zhou, Xiaorui
    Zhang, Qian
    Xu, Bingchao
    Xue, Jianru
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2020, 80
  • [3] A Secure Perceptual Hash Algorithm for Image Content Authentication
    Weng, Li
    Preneel, Bart
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 108 - 121
  • [4] A Novel Hash based Technique for Thermal Image Authentication
    Sengupta, Madhumita
    Mandal, Pragati
    Das, Tanmoy
    Dey, Abhijit
    FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 : 147 - 156
  • [5] Image Hash Authentication Scheme Based on Composite Domain
    Song, Baolin
    Wang, Chunxing
    2014 INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING AND AUTOMATION (ICMEA), 2014, : 268 - 273
  • [6] Robust image hash in Radon transform domain for authentication
    Lei, Yanqiang
    Wang, Yuangen
    Huang, Jiwu
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2011, 26 (06) : 280 - 288
  • [7] A Novel Perceptual Hash Algorithm for Multispectral Image Authentication
    Ding, Kaimeng
    Chen, Shiping
    Meng, Fan
    ALGORITHMS, 2018, 11 (01)
  • [8] Image authentication based on perceptual hash using Gabor filters
    Wang, Lina
    Jiang, Xiaqiu
    Lian, Shiguo
    Hu, Donghui
    Ye, Dengpan
    SOFT COMPUTING, 2011, 15 (03) : 493 - 504
  • [9] Perceptual hash algorithm for integrity authentication of remote sensing image
    Ding, Kaimeng
    Zhu, Changqing
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2014, 44 (04): : 723 - 727
  • [10] A secure and robust hash-based scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    Abbas, Vali Uddin
    SIGNAL PROCESSING, 2010, 90 (05) : 1456 - 1470