Recent development of perceptual image hashing

The easy generation, storage, transmission and reproduction of digital images have caused serious abuse and security problems. Assurance of the rightful ownership, integrity, and authenticity is a major concern to the academia as well as the industry. On the other hand, efficient search of the huge amount of images has become a great challenge. Image hashing is a technique suitable for use in image authentication and content based image retrieval (CBIR). In this article, we review some representative image hashing techniques proposed in the recent years, with emphases on how to meet the conflicting requirements of perceptual robustness and security. Following a brief introduction to some earlier methods, we focus on a typical two-stage structure and some geometric-distortion resilient techniques. We then introduce two image hashing approaches developed in our own research, and reveal security problems in some existing methods due to the absence of secret keys in certain stage of the image feature extraction, or availability of a large quantity of images, keys, or the hash function to the adversary. More research efforts are needed in developing truly robust and secure image hashing techniques.

[1]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[2]  Krishnan Seetharaman The CORBA connection , 1998, CACM.

[3]  Vishal Monga,et al.  Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.

[4]  Rosa Lancini,et al.  A novel hashing algorithm for video sequences , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[5]  Jean-Didier Legat,et al.  RASH: RAdon soft hash algorithm , 2002, 2002 11th European Signal Processing Conference.

[6]  Lothar Fritsch,et al.  Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement , 2006, Privacy Enhancing Technologies.

[7]  Chun-Shien Lu,et al.  Robust mesh-based hashing for copy detection and tracing of images , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[8]  Vishal Monga,et al.  A clustering based approach to perceptual image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[9]  Nasir D. Memon,et al.  Perceptual Audio Hashing Functions , 2005, EURASIP J. Adv. Signal Process..

[10]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[11]  Shih-Fu Chang,et al.  New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Transactions on Multimedia.

[12]  Martin Schmucker,et al.  The need of perceptual hashing techniques for music scores , 2003, Proceedings Third International Conference on WEB Delivering of Music.

[13]  Nasir D. Memon,et al.  Protecting digital media content , 1998, CACM.

[14]  LuChun-Shien,et al.  Structural digital signature for image authentication , 2003 .

[15]  Christophe De Vleeschouwer,et al.  Robust image hashing based on radial variance of pixels , 2005, IEEE International Conference on Image Processing 2005.

[16]  Shih-Hsuan Yang,et al.  Robust image hashing based on SPIHT , 2005, ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005..

[17]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..

[18]  H. Sebastian Seung,et al.  Algorithms for Non-negative Matrix Factorization , 2000, NIPS.

[19]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[20]  Jiwu Huang,et al.  Image fragile watermarking based on fusion of multi-resolution tamper detection , 2002 .

[21]  Zhang Xinpeng Robust Image Hashing Based on Harris Corners , 2008 .

[22]  Christopher G. Harris,et al.  A Combined Corner and Edge Detector , 1988, Alvey Vision Conference.

[23]  Andreas Uhl,et al.  Robustness and security of a wavelet-based CBIR hashing algorithm , 2006, MM&Sec '06.

[24]  Pierre Vandergheynst,et al.  End-stopped wavelets for detecting low-level features , 1999, Optics & Photonics.

[25]  Jiri Matas,et al.  Robust wide-baseline stereo from maximally stable extremal regions , 2004, Image Vis. Comput..

[26]  Vishal Monga,et al.  Perceptually based methods for robust image hashing , 2005 .

[27]  Cordelia Schmid,et al.  Scale & Affine Invariant Interest Point Detectors , 2004, International Journal of Computer Vision.

[28]  Min Wu,et al.  Image hashing resilient to geometric and filtering operations , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..

[29]  Zhang Xinpeng,et al.  Image block feature vectors based on a singular-value information metric and color-texture description , 2007 .

[30]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[31]  Rosa Lancini,et al.  Audio content identification by using perceptual hashing , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[32]  Vishal Monga,et al.  Robust Image Hashing Via Non-Negative Matrix Factorizations , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[33]  Ramarathnam Venkatesan,et al.  Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[34]  Shu Lin,et al.  An Extendible Hash for Multi-Precision Similarity Querying of Image Databases , 2001, VLDB.

[35]  Jiri Fridrich,et al.  Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[36]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[37]  Shih-Fu Chang,et al.  New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Trans. Multim..

[38]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[39]  Zhang Xinpeng Image Hashing Based on Human Visual System , 2006 .

[40]  Ramarathnam Venkatesan,et al.  New Iterative Geometric Methods for Robust Perceptual Image Hashing , 2001, Digital Rights Management Workshop.

[41]  Chun-Shien Lu,et al.  Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication , 2005, Multimedia Systems.

[42]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .