Perceptual image hashing based on a deep convolution neural network for content authentication

Abstract. Image hash functions have wide-ranging application in many fields. This study presents a perceptual image-hashing scheme for a deep convolutional neural network (DCNN) for the purpose of content authentication. First, an AlexNet model of DCNN is constructed and trained to assess the performance of a given network. Then, the trained network is used to extract an image feature matrix. Finally, an image-hashing series is generated for content authentication. Experimental results show that, compared with other methods, the proposed method has a higher discrimination capability and an acceptable robustness against content-preserving operations, such as random attacks, rotation, JPEG compression, and additive Gaussian noise. A receiver operating characteristics curve is employed and demonstrates that the proposed image hashing obtains a desirable compromise between discrimination and robustness.

[1]  Ivan Laptev,et al.  Learning and Transferring Mid-level Image Representations Using Convolutional Neural Networks , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[2]  Geoffrey E. Hinton,et al.  Reducing the Dimensionality of Data with Neural Networks , 2006, Science.

[3]  Chi-Man Pun,et al.  Multi-scale image hashing using adaptive local feature extraction for robust tampering detection , 2016, Signal Process..

[4]  Tairui Chen,et al.  Going Deeper with Convolutional Neural Network for Intelligent Transportation , 2016 .

[5]  Ramarathnam Venkatesan,et al.  Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[6]  Vishal Monga,et al.  Robust perceptual image hashing using feature points , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[7]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[8]  Hanjiang Lai,et al.  Simultaneous feature learning and hash coding with deep neural networks , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[9]  Heung-Kyu Lee,et al.  Median Filtered Image Restoration and Anti-Forensics Using Adversarial Networks , 2018, IEEE Signal Processing Letters.

[10]  Hisao Ishibuchi,et al.  Multi-clustering via evolutionary multi-objective optimization , 2018, Inf. Sci..

[11]  Xuelong Li,et al.  Hierarchical Recurrent Neural Hashing for Image Retrieval With Hierarchical Convolutional Features , 2018, IEEE Transactions on Image Processing.

[12]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[13]  Weiguo Fan,et al.  A new image classification method using CNN transfer learning and web data augmentation , 2018, Expert Syst. Appl..

[14]  Yanqiang Lei,et al.  Robust image hash in Radon transform domain for authentication , 2011, Signal Process. Image Commun..

[15]  Jeffrey Dean,et al.  Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.

[16]  Muhammad Awais,et al.  Medical image retrieval using deep convolutional neural network , 2017, Neurocomputing.

[17]  Zhenjun Tang,et al.  Robust image hashing with multidimensional scaling , 2017, Signal Process..

[18]  Aditi,et al.  Robust image hashing through DWT-SVD and spectral residual method , 2017, EURASIP Journal on Image and Video Processing.

[19]  Qi Tian,et al.  Part-Based Deep Hashing for Large-Scale Person Re-Identification , 2017, IEEE Transactions on Image Processing.

[20]  Huazhong Shu,et al.  Robust hashing for image authentication using SIFT feature and quaternion Zernike moments , 2015, Multimedia Tools and Applications.

[21]  Xinpeng Zhang,et al.  Robust Hashing for Image Authentication Using Zernike Moments and Local Features , 2013, IEEE Transactions on Information Forensics and Security.

[22]  Anwen Wu,et al.  A Novel Robust Image-Hashing Method for Content Authentication , 2015, 2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec).

[23]  Huazhong Shu,et al.  Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform , 2015, Digit. Signal Process..

[24]  Chi-Man Pun,et al.  Quaternion-Based Image Hashing for Adaptive Tampering Localization , 2016, IEEE Transactions on Information Forensics and Security.

[25]  Chuanlei Yang,et al.  Multi-objective online optimization of a marine diesel engine using NSGA-II coupled with enhancing trained support vector machine , 2018, Applied Thermal Engineering.

[26]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[27]  Rabul Hussain Laskar,et al.  Image authentication based on robust image hashing with geometric correction , 2018, Multimedia Tools and Applications.

[28]  Ladislav Lenc,et al.  On the effects of using word2vec representations in neural networks for dialogue act recognition , 2020, Comput. Speech Lang..

[29]  Chakravarthy Bhagvati,et al.  Word Representations For Gender Classification Using Deep Learning , 2018 .

[30]  Govindaraj P,et al.  Ring Partition and DWT Based Perceptual Image Hashing with Application to Indexing and Retrieval of Near-Identical Images , 2015, 2015 Fifth International Conference on Advances in Computing and Communications (ICACC).

[31]  V. Monga Robust and Secure Image Hashing via , 2007 .

[32]  Shichao Zhang,et al.  Robust Perceptual Image Hashing Based on Ring Partition and NMF , 2014, IEEE Transactions on Knowledge and Data Engineering.

[33]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[34]  Shichao Zhang,et al.  Robust Image Hashing With Ring Partition and Invariant Vector Distance , 2016, IEEE Transactions on Information Forensics and Security.

[35]  Jianru Xue,et al.  A Visual Model-Based Perceptual Image Hash for Content Authentication , 2015, IEEE Transactions on Information Forensics and Security.

[36]  Jian Sun,et al.  Spatial Pyramid Pooling in Deep Convolutional Networks for Visual Recognition , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[37]  J. Fridrich,et al.  Digital image forensics , 2009, IEEE Signal Processing Magazine.

[38]  Fan Yang,et al.  Robust image hashing via colour vector angles and discrete wavelet transform , 2014, IET Image Process..

[39]  Ram Kumar Karsh,et al.  Robust image hashing using ring partition-PGNMF and local features , 2016, SpringerPlus.