A Review of Hashing based Image Copy Detection Techniques

Abstract Images are considered to be natural carriers of information, and a large number of images are created, exchanged and are made available online. Apart from creating new images, the availability of number of duplicate copies of images is a critical problem. Hashing based image copy detection techniques are a promising alternative to address this problem. In this approach, a hash is constructed by using a set of unique features extracted from the image for identification. This article provides a comprehensive review of the state-of-the-art image hashing techniques. The reviewed techniques are categorized by the mechanism used and compared across a set of functional & performance parameters. The article finally highlights the current issues faced by such systems and possible future directions to motivate further research work.

[1]  Shih-Fu Chang,et al.  A Robust and Secure Media Signature Scheme for JPEG Images , 2005, J. VLSI Signal Process..

[2]  Zhenjun Tang,et al.  Robust image hashing based on color vector angle and Canny operator , 2016 .

[3]  Z. Jane Wang,et al.  An Extended Image Hashing Concept: Content-Based Fingerprinting Using FJLT , 2009, EURASIP J. Inf. Secur..

[4]  Ramarathnam Venkatesan,et al.  Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[5]  Chun-Shien Lu,et al.  Robust mesh-based hashing for copy detection and tracing of images , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[6]  Yanqiang Lei,et al.  An image copy detection scheme based on radon transform , 2010, 2010 IEEE International Conference on Image Processing.

[7]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[8]  K. Rhee,et al.  A key-dependent secure image hashing scheme by using Radon transform , 2009, 2009 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS).

[9]  Bian Yang,et al.  Block Mean Value Based Image Perceptual Hashing , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[10]  Fouad Khelifi,et al.  Perceptual Image Hashing Based on Virtual Watermark Detection , 2010, IEEE Transactions on Image Processing.

[11]  Andreas Uhl,et al.  Robustness and security of a wavelet-based CBIR hashing algorithm , 2006, MM&Sec '06.

[12]  Shiguo Lian,et al.  A passive image authentication scheme for detecting region-duplication forgery with rotation , 2011, J. Netw. Comput. Appl..

[13]  Fan Yang,et al.  Robust image hashing via colour vector angles and discrete wavelet transform , 2014, IET Image Process..

[14]  Chun-Shien Lu,et al.  Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication , 2005, Multimedia Systems.

[15]  Xinpeng Zhang,et al.  Lexicographical framework for image hashing with implementation based on DCT and NMF , 2009, Multimedia Tools and Applications.

[16]  C. De Vleeschouwer,et al.  Robust video hashing based on radial projections of key frames , 2005, IEEE Transactions on Signal Processing.

[17]  Ramarathnam Venkatesan,et al.  A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding , 2001, Information Hiding.

[18]  Shih-Hsuan Yang,et al.  Robust image hashing based on SPIHT , 2005, ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005..

[19]  Dimitris Kanellopoulos,et al.  Recent Advances in Multimedia Information System Security , 2009, Informatica.

[20]  Aditi,et al.  Robust image hashing through DWT-SVD and spectral residual method , 2017, EURASIP Journal on Image and Video Processing.

[21]  Ramarathnam Venkatesan,et al.  The randlet transform: Applications to universal perceptual hash- ing and image identi¯cation , 2004 .

[22]  Weimin Wei,et al.  Perceptual image hash for tampering detection using Zernike moments , 2010, 2010 IEEE International Conference on Progress in Informatics and Computing.

[23]  Ping Li,et al.  Nonnegative sparse coding induced hashing for image copy detection , 2013, Neurocomputing.

[24]  Jiri Fridrich,et al.  Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[25]  Vishal Monga,et al.  Robust perceptual image hashing using feature points , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[26]  Jean-Luc Dugelay,et al.  A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..

[27]  William Puech,et al.  A robust and secure perceptual hashing system based on a quantization step analysis , 2013, Signal Process. Image Commun..

[28]  Mohamed Deriche,et al.  A bibliography of pixel-based blind image forgery detection techniques , 2015, Signal Process. Image Commun..

[29]  Ramarathnam Venkatesan,et al.  New Iterative Geometric Methods for Robust Perceptual Image Hashing , 2001, Digital Rights Management Workshop.

[30]  Fan Yang,et al.  Robust Image Hashing Based on Multiple Histograms , 2012 .

[31]  Fang Liu,et al.  Wave atom transform generated strong image hashing scheme , 2012 .

[32]  Vishal Monga,et al.  Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.

[33]  Shih-Fu Chang Blind Passive Media Forensics: Motivation and Opportunity , 2007, MCAM.

[34]  Jingbing Li,et al.  A New Zero-Watermarking Algorithm Resisting Attacks Based on Differences Hashing , 2016 .

[35]  Ming-Syan Chen,et al.  A New Approach to Image Copy Detection Based on Extended Feature Sets , 2007, IEEE Transactions on Image Processing.

[36]  Judith Redi,et al.  Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.

[37]  Jiwu Huang,et al.  Histogram-based image hashing scheme robust against geometric deformations , 2007, MM&Sec.

[38]  Ram Kumar Karsh,et al.  Robust image hashing using ring partition-PGNMF and local features , 2016, SpringerPlus.

[39]  Brian M. Kurkoski,et al.  Robust image hashing using image normalization and SVD decomposition , 2011, 2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS).

[40]  Rui Sun,et al.  Robust image hashing using locally linear embedding , 2011, 2011 International Conference on Computer Science and Service System (CSSS).

[41]  Huazhong Shu,et al.  Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform , 2015, Digit. Signal Process..

[42]  Chuan Qin,et al.  Robust image hashing with embedding vector variance of LLE , 2015, Digit. Signal Process..

[43]  A. El-Attar,et al.  New Proposed Fusion between DCT for Feature Extraction and NSVC for Face Classification , 2018 .

[44]  Sheng-He Sun,et al.  Image Robust Hashing Based on DCT Sign , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[45]  Chin-Chen Chang,et al.  Novel image copy detection with rotating tolerance , 2007, J. Syst. Softw..

[46]  Kannan Ramchandran,et al.  Dither-based secure image hashing using distributed coding , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[47]  Di Wu,et al.  A novel image hash algorithm resistant to print-scan , 2009, Signal Process..

[48]  Gábor Szűcs,et al.  Content-Based Image Retrieval for Multiple Objects Search , 2017 .

[49]  Philip Ogunbona,et al.  Compression tolerant DCT based image hash , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..

[50]  Vishal Monga,et al.  Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.

[51]  Lahouari Ghouti,et al.  Perceptual hashing of color images using hypercomplex representations , 2013, 2013 IEEE International Conference on Image Processing.

[52]  Vishal Monga,et al.  Image Authentication Under Geometric Attacks Via Structure Matching , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[53]  Zhenjun Tang,et al.  Robust image hashing with dominant DCT coefficients , 2014 .

[54]  Min Wu,et al.  Image hashing resilient to geometric and filtering operations , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..

[55]  Shang-Lin Hsieh,et al.  Using binarization and hashing for efficient SIFT matching , 2015, J. Vis. Commun. Image Represent..

[56]  Benoit M. Macq,et al.  A robust soft hash algorithm for digital image signature , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[57]  Andreas Uhl,et al.  Robust Hash Functions for Visual Data: An Experimental Comparison , 2003, IbPRIA.

[58]  Andreas Uhl,et al.  Key-Dependent JPEG2000-Based Robust Hashing for Secure Image Authentication , 2008, EURASIP J. Inf. Secur..

[59]  Xiamu Niu,et al.  Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice Vector Quantization , 2012, IEEE Transactions on Image Processing.

[60]  Xinpeng Zhang,et al.  Robust Hashing for Image Authentication Using Zernike Moments and Local Features , 2013, IEEE Transactions on Information Forensics and Security.

[61]  Z. Jane Wang,et al.  Perceptual Image Hashing Based on Shape Contexts and Local Feature Points , 2012, IEEE Transactions on Information Forensics and Security.

[62]  Shichao Zhang,et al.  Perceptual Image Hashing with Histogram of Color Vector Angles , 2012, AMT.

[63]  Shiguo Lian,et al.  Robust Perceptual Image Hash Using Gabor Filters , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[64]  Changick Kim,et al.  Content-based image copy detection , 2003, Signal Process. Image Commun..

[65]  Yanqiang Lei,et al.  Robust image hash in Radon transform domain for authentication , 2011, Signal Process. Image Commun..

[66]  Z. Jane Wang,et al.  Compressed Binary Image Hashes Based on Semisupervised Spectral Embedding , 2013, IEEE Transactions on Information Forensics and Security.

[67]  Xinpeng Zhang,et al.  Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection , 2011, Fundam. Informaticae.

[68]  Y. L. Liu,et al.  A Robust Image Hashing Algorithm Resistant Against Geometrical Attacks , 2013 .

[69]  Zhenjun Tang,et al.  Robust image hashing using ring-based entropies , 2013, Signal Process..

[70]  Jiuchao Feng,et al.  Robust image hashing using invariants of Tchebichef moments , 2014 .

[71]  Giovanni Maria Farinella,et al.  Robust Image Alignment for Tampering Detection , 2012, IEEE Transactions on Information Forensics and Security.

[72]  Mohammed Yakoob Siyal,et al.  A secure and robust hash-based scheme for image authentication , 2010, Signal Process..

[73]  Zhenjun Tang,et al.  Robust image hash function using local color features , 2013 .

[74]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[75]  Qi Tian,et al.  A robust and secure media signature scheme for JPEG images , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[76]  Xinpeng Zhang,et al.  Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization , 2008 .

[77]  Dimitrios Hatzinakos,et al.  Content Based Image Hashing Via Wavelet and Radon Transform , 2007, PCM.

[78]  Shichao Zhang,et al.  Robust Perceptual Image Hashing Based on Ring Partition and NMF , 2014, IEEE Transactions on Knowledge and Data Engineering.

[79]  Chin-Chen Chang,et al.  Robust image hashing using non-uniform sampling in discrete Fourier domain , 2013, Digit. Signal Process..

[80]  Zhenjun Tang,et al.  Perceptual Hashing for Color Images Using Invariant Moments , 2012 .

[81]  Ton Kalker,et al.  A robust image fingerprinting system using the Radon transform , 2004, Signal Process. Image Commun..

[82]  XiaoBing Kang,et al.  An efficient approach to still image copy detection based on SVD and block partition for digital forensics , 2009, 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems.

[83]  Jean-Didier Legat,et al.  RASH: RAdon soft hash algorithm , 2002, 2002 11th European Signal Processing Conference.

[84]  Osamah M. Al-Qershi,et al.  Passive detection of copy-move forgery in digital images: state-of-the-art. , 2013, Forensic science international.

[85]  Edward Y. Chang,et al.  RIME: a replicated image detector for the World Wide Web , 1998, Other Conferences.

[86]  Qibin Sun,et al.  Robust Hash for Detecting and Localizing Image Tampering , 2007, 2007 IEEE International Conference on Image Processing.

[87]  Hefei Ling,et al.  Fast image copy detection approach based on local fingerprint defined visual words , 2013, Signal Process..

[88]  Chun-Shien Lu,et al.  Compressive sensing-based image hashing , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[89]  Shichao Zhang,et al.  Robust Image Hashing With Ring Partition and Invariant Vector Distance , 2016, IEEE Transactions on Information Forensics and Security.

[90]  Jianru Xue,et al.  A Visual Model-Based Perceptual Image Hash for Content Authentication , 2015, IEEE Transactions on Information Forensics and Security.