Learning to Hash for Personalized Image Authentication

被引:16
|
作者
Su, Zhiyong [1 ]
Yao, Liang [1 ]
Mei, Jialin [1 ]
Zhou, Lang [2 ]
Li, Weiqing [3 ]
机构
[1] Nanjing Univ Sci & Technol, Visual Comp Grp, Sch Automat, Nanjing 210094, Peoples R China
[2] Nanjing Univ Finance & Econ, Coll Informat Engn, Nanjing 210023, Peoples R China
[3] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Quantization (signal); Feature extraction; Measurement; Training; Task analysis; Binary codes; Metric learning; supervised quantization; image authentication; image hashing; LMNN; MARGIN NEAREST-NEIGHBOR;
D O I
10.1109/TCSVT.2020.3002146
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper takes a fresh look at the image authentication problem and proposes an alternative framework for personalized authentication based on the hash learning technology. Conventional image authentication methods tend to provide a general authentication framework for all images with the fixed quantization strategy and fixed control parameters determined based on given limited images and attacks. However, they may suffer from more or less misjudgments in practice, not to mention performance degradation when encountering out-of-sample images. Instead of proposing a new feature extraction algorithm, a novel personalized authentication framework which incorporates the distance metric learning technology and supervised quantization strategy to the process of image authentication is proposed in this paper. The tamper detection task is reformulated as a new supervised manipulation classification problem. For each input image, various content-preserving and content-changing samples are generated automatically firstly. Then, feature representations of all samples can be obtained by existing feature extraction methods. After that, a weighted large margin for manipulation classification (WLMMC) scheme is proposed to learn an effective feature mapping space to improve the classification performance between content-changing samples and content-preserving samples. During the quantization stage, a novel supervised personalized quantization strategy (SPQ), which is motivated by the observation that different attacks have different degrees of influence on feature components, is proposed to learn more compact yet discriminative binary codes for each input image. Effectiveness of the proposed framework is qualitatively and quantitatively demonstrated on a variety of images. Extensive experiments show that the proposed framework can significantly improve the authentication performance over the state-of-the-art techniques while achieve more compact hash codes flexibly as required.
引用
收藏
页码:1648 / 1660
页数:13
相关论文
共 50 条
  • [31] Fragile watermarking and unkeyed hash function implementation for image authentication on CNN-UM
    Yalcin, ME
    Vandewalle, J
    CELLULAR NEURAL NETWORKS AND THEIR APPLICATIONS, 2002, : 399 - 406
  • [32] Robust hash generation technique for content-based image authentication using histogram
    Vadlamudi, Lokanadham Naidu
    Vaddella, Rama Prasad V.
    Devara, Vasumathi
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (11) : 6585 - 6604
  • [33] Robust hash generation technique for content-based image authentication using histogram
    Lokanadham Naidu Vadlamudi
    Rama Prasad V. Vaddella
    Vasumathi Devara
    Multimedia Tools and Applications, 2016, 75 : 6585 - 6604
  • [34] Authentication in stealth distributed hash tables
    MacQuire, Andrew
    Brampton, Andrew
    Rai, Idris A.
    Race, Nicholas J. P.
    Mathy, Laurent
    JOURNAL OF SYSTEMS ARCHITECTURE, 2008, 54 (06) : 607 - 618
  • [35] Authentication in stealth Distributed Hash Tables
    MacQuire, Andrew
    Brampton, Andrew
    Rai, Idris A.
    Race, Nicholas J. P.
    Mathy, Laurent
    32ND EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA) - PROCEEDINGS, 2006, : 348 - +
  • [36] Deep Learning of Binary Hash Codes for Fast Image Retrieval
    Lin, Kevin
    Yang, Huei-Fang
    Hsiao, Jen-Hao
    Chen, Chu-Song
    2015 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2015,
  • [37] Ensemble learning framework for image retrieval via hash centers
    Zhao, Yan
    Meng, Hongwei
    Xue, Liang
    Journal of Electronic Imaging, 2024, 33 (06)
  • [38] Transformer-Based Distillation Hash Learning for Image Retrieval
    Lv, Yuanhai
    Wang, Chongyan
    Yuan, Wanteng
    Qian, Xiaohao
    Yang, Wujun
    Zhao, Wanqing
    ELECTRONICS, 2022, 11 (18)
  • [39] Learning binary hash codes for finger vein image retrieval
    Su, Kun
    Yang, Gongping
    Yang, Lu
    Li, Dunfeng
    Su, Peng
    Yin, Yilong
    PATTERN RECOGNITION LETTERS, 2019, 117 : 74 - 82
  • [40] Asymmetric Hash Code Learning for Remote Sensing Image Retrieval
    Song, Weiwei
    Gao, Zhi
    Dian, Renwei
    Ghamisi, Pedram
    Zhang, Yongjun
    Benediktsson, Jon Atli
    IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2022, 60