Efficient Image Hashing with Geometric Invariant Vector Distance for Copy Detection

Hashing method is an efficient technique of multimedia security for content protection. It maps an image into a content-based compact code for denoting the image itself. While most existing algorithms focus on improving the classification between robustness and discrimination, little attention has been paid to geometric invariance under normal digital operations, and therefore results in quite fragile to geometric distortion when applied in image copy detection. In this article, a novel effective image hashing method is proposed based on geometric invariant vector distance in both spatial domain and frequency domain. First, the image is preprocessed by some joint operations to extract robust features. Then, the preprocessed image is randomly divided into several overlapping blocks under a secret key, and two different feature matrices are separately obtained in the spatial domain and frequency domain through invariant moment and low frequency discrete cosine transform coefficients. Furthermore, the invariant distances between vectors in feature matrices are calculated and quantified to form a compact hash code. We conduct various experiments to demonstrate that the proposed hashing not only reaches good classification between robustness and discrimination, but also resists most geometric distortion in image copy detection. In addition, both receiver operating characteristics curve comparisons and mean average precision in copy detection clearly illustrate that the proposed hashing method outperforms state-of-the-art algorithms.

[1]  Mohammed Yakoob Siyal,et al.  A secure and robust hash-based scheme for image authentication , 2010, Signal Process..

[2]  Svetlana Lazebnik,et al.  Asymmetric Distances for Binary Embeddings , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[3]  Kien A. Hua,et al.  Learning Label Preserving Binary Codes for Multimedia Retrieval , 2018, ACM Trans. Multim. Comput. Commun. Appl..

[4]  Bir Bhanu,et al.  Feature synthesized EM algorithm for image retrieval , 2008, TOMCCAP.

[5]  Kai Liu,et al.  Robust image hashing via DCT and LLE , 2016, Comput. Secur..

[6]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[7]  Meng Wang,et al.  Self-Supervised Video Hashing With Hierarchical Binary Auto-Encoder , 2018, IEEE Transactions on Image Processing.

[8]  Zhenjun Tang,et al.  Robust image hashing with dominant DCT coefficients , 2014 .

[9]  Xianglong Liu,et al.  Distributed Adaptive Binary Quantization for Fast Nearest Neighbor Search , 2017, IEEE Transactions on Image Processing.

[10]  Zhenjun Tang,et al.  Robust image hashing based on color vector angle and Canny operator , 2016 .

[11]  Stéphane Manuel,et al.  Classification and generation of disturbance vectors for collision attacks against SHA-1 , 2011, Des. Codes Cryptogr..

[12]  Z. Jane Wang,et al.  An Extended Image Hashing Concept: Content-Based Fingerprinting Using FJLT , 2009, EURASIP J. Inf. Secur..

[13]  Harald Kosch,et al.  Image Database , 2009, Encyclopedia of Database Systems.

[14]  K. Rhee,et al.  A key-dependent secure image hashing scheme by using Radon transform , 2009, 2009 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS).

[15]  Guojiang Xin,et al.  Robust Image Hashing Using Radon Transform and Invariant Features , 2016 .

[16]  Bart Preneel,et al.  Radon Transform-Based Secure Image Hashing , 2011, Communications and Multimedia Security.

[17]  Heng Tao Shen,et al.  Beyond Frame-level CNN: Saliency-Aware 3-D CNN With LSTM for Video Action Recognition , 2017, IEEE Signal Processing Letters.

[18]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[19]  Xiamu Niu,et al.  Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice Vector Quantization , 2012, IEEE Transactions on Image Processing.

[20]  Fouad Khelifi,et al.  Perceptual Image Hashing Based on Virtual Watermark Detection , 2010, IEEE Transactions on Image Processing.

[21]  Xinpeng Zhang,et al.  Perceptual image hashing via dual-cross pattern encoding and salient structure detection , 2018, Inf. Sci..

[22]  Yang Yang,et al.  Deep Asymmetric Pairwise Hashing , 2017, ACM Multimedia.

[23]  Zhenjun Tang,et al.  Robust image hashing with multidimensional scaling , 2017, Signal Process..

[24]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[25]  Ming-Syan Chen,et al.  A New Approach to Image Copy Detection Based on Extended Feature Sets , 2007, IEEE Transactions on Image Processing.

[26]  Xinpeng Zhang,et al.  Robust Hashing for Image Authentication Using Zernike Moments and Local Features , 2013, IEEE Transactions on Information Forensics and Security.

[27]  Z. Jane Wang,et al.  Perceptual Image Hashing Based on Shape Contexts and Local Feature Points , 2012, IEEE Transactions on Information Forensics and Security.

[28]  Gang Wang,et al.  A Robust Image Hashing with Enhanced Randomness by Using Random Walk on Zigzag Blocking , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[29]  Chi-Man Pun,et al.  Quaternion-Based Image Hashing for Adaptive Tampering Localization , 2016, IEEE Transactions on Information Forensics and Security.

[30]  Xiaoshuai Sun,et al.  Two-Stream 3-D convNet Fusion for Action Recognition in Videos With Arbitrary Size and Length , 2018, IEEE Transactions on Multimedia.

[31]  Fan Yang,et al.  Robust image hashing via colour vector angles and discrete wavelet transform , 2014, IET Image Process..

[32]  Cordelia Schmid,et al.  Aggregating Local Image Descriptors into Compact Codes , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[33]  Shichao Zhang,et al.  Robust Perceptual Image Hashing Based on Ring Partition and NMF , 2014, IEEE Transactions on Knowledge and Data Engineering.

[34]  Edward J. Delp,et al.  Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..

[35]  Xinbo Gao,et al.  Triplet-Based Deep Hashing Network for Cross-Modal Retrieval , 2018, IEEE Transactions on Image Processing.

[36]  Wei Liu,et al.  Asymmetric Binary Coding for Image Search , 2017, IEEE Transactions on Multimedia.

[37]  Vishal Monga,et al.  Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.

[38]  Xian-Sheng Hua,et al.  A unified context model for web image retrieval , 2012, TOMCCAP.

[39]  Shijun Xiang Histogram-Based Perceptual Image Hashing in the DWT Domain , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[40]  Saeed Mozaffari,et al.  Perceptual image hashing using center-symmetric local binary patterns , 2015, Multimedia Tools and Applications.

[41]  Hefei Ling,et al.  Efficient Image Copy Detection Using Multiscale Fingerprints , 2012, IEEE MultiMedia.

[42]  Xuelong Li,et al.  Graph PCA Hashing for Similarity Search , 2017, IEEE Transactions on Multimedia.

[43]  Changick Kim,et al.  Content-based image copy detection , 2003, Signal Process. Image Commun..

[44]  Chuan Qin,et al.  Robust image hashing with embedding vector variance of LLE , 2015, Digit. Signal Process..

[45]  Nicu Sebe,et al.  Quantization-based hashing: a general framework for scalable image and video retrieval , 2018, Pattern Recognit..

[46]  Xingming Sun,et al.  Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.

[47]  Zhenjun Tang,et al.  Colour Space Selection in Image Hashing: An Experimental Study , 2017 .

[48]  Jean-Didier Legat,et al.  RASH: RAdon soft hash algorithm , 2002, 2002 11th European Signal Processing Conference.

[49]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[50]  C. De Vleeschouwer,et al.  Robust video hashing based on radial projections of key frames , 2005, IEEE Transactions on Signal Processing.

[51]  Shichao Zhang,et al.  Robust Image Hashing with Tensor Decomposition , 2019, IEEE Transactions on Knowledge and Data Engineering.

[52]  James Ze Wang,et al.  Content-based image indexing and searching using Daubechies' wavelets , 1998, International Journal on Digital Libraries.

[53]  Shichao Zhang,et al.  Robust Image Hashing With Ring Partition and Invariant Vector Distance , 2016, IEEE Transactions on Information Forensics and Security.

[54]  Jianru Xue,et al.  A Visual Model-Based Perceptual Image Hash for Content Authentication , 2015, IEEE Transactions on Information Forensics and Security.

[55]  Ming-Kuei Hu,et al.  Visual pattern recognition by moment invariants , 1962, IRE Trans. Inf. Theory.

[56]  George Wolberg,et al.  Robust image registration using log-polar transform , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[57]  Neil J. Hurley,et al.  Performance Analysis of Robust Audio Hashing , 2007, IEEE Transactions on Information Forensics and Security.

[58]  Falk Scholer,et al.  User performance versus precision measures for simple search tasks , 2006, SIGIR.

[59]  Xuelong Li,et al.  Image hashing with color vector angle , 2018, Neurocomputing.

[60]  Zhi-Hua Zhou,et al.  Column Sampling Based Discrete Supervised Hashing , 2016, AAAI.

[61]  Chi-Man Pun,et al.  Multi-scale image hashing using adaptive local feature extraction for robust tampering detection , 2016, Signal Process..

[62]  Ramarathnam Venkatesan,et al.  Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..