A Robust Contourlet Based Image Hash Algorithm

Image searching and authentication have become strong requirements in the digital world. Image perceptual hashing has been proposed to meet them. In this paper, a rotation resilient image hashing algorithm is presented. In the algorithm, the position information of original image is extracted to adjust the rotation. Then the features of the image are extracted by contourlet transform. The key-dependence was introduced in this step by random blocking. The rotation is compensated by position information. Thus our algorithm is very robust to rotation attack. Benefited from the efficient image representation capability of contourlet transform, the robustness and discrimination of proposed method are improved. The experimental results show that the proposed method is better than some existing key dependent methods in robustness.

[1]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[2]  Qiong Li,et al.  Predigest Watson's Visual Model as Perceptual Hashing Method , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[3]  Jiri Fridrich,et al.  Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[4]  N. Memon,et al.  Confusion/Diffusion Capabilities of Some Robust Hash Functions , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[5]  Vishal Monga,et al.  Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.

[6]  Minh N. Do,et al.  Ieee Transactions on Image Processing the Contourlet Transform: an Efficient Directional Multiresolution Image Representation , 2022 .

[7]  R. Eslami,et al.  The contourlet transform for image denoising using cycle spinning , 2003, The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003.

[8]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[9]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.