Robust and Secure Image Fingerprinting Learned by Neural Network

Image fingerprinting is a technique that summarizes the perceptual characteristics of a digital image into an invariant digest, and it is one of the most effective solutions for digital rights management. Most conventional fingerprinting algorithms were developed by assembling manually designed feature extractor and quantizer, which requires extensive expert knowledge and may not capture the intrinsic or abstract visual characteristics of the digital image. Focusing on content identification related applications, we propose a data-driven image fingerprinting algorithm in this paper, where neural network is trained to automatically discover the optimal mapping from image to fingerprint. To ameliorate the difficulty of training, we start by training the fingerprint-computation network in a layer-wise manner to progressively improve its robustness against content-preserving distortions. Initialized by the states learned by layer-wise training, the network is then re-trained as a holistic unit, with the objective of maximizing its content identification accuracy. Moreover, we also develop a key-dependent version of the neural network-based fingerprinting algorithm. By quantifying its security using information-theoretic metrics, we have proved that the hierarchical architecture of neural network is beneficial to the security of fingerprinting algorithm. The experimental results on a large testing database show that the proposed work exhibits much higher content identification accuracy than state-of-the-art algorithms, and its execution speed is in the millisecond time scale.

[1]  Chuan Qin,et al.  Robust image hashing with embedding vector variance of LLE , 2015, Digit. Signal Process..

[2]  Nicu Sebe,et al.  Quantization-based hashing: a general framework for scalable image and video retrieval , 2018, Pattern Recognit..

[3]  Min Wu,et al.  Modeling content fingerprints using markov random fields , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[4]  Ramarathnam Venkatesan,et al.  A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding , 2001, Information Hiding.

[5]  Rabab Kreidieh Ward,et al.  A Robust and Fast Video Copy Detection System Using Content-Based Fingerprinting , 2011, IEEE Transactions on Information Forensics and Security.

[6]  Zhenjun Tang,et al.  Robust image hashing with multidimensional scaling , 2017, Signal Process..

[7]  Z. Jane Wang,et al.  Compressed Binary Image Hashes Based on Semisupervised Spectral Embedding , 2013, IEEE Transactions on Information Forensics and Security.

[8]  Chun-Shien Lu,et al.  Compressive sensing-based image hashing , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[9]  Shichao Zhang,et al.  Robust Image Hashing With Ring Partition and Invariant Vector Distance , 2016, IEEE Transactions on Information Forensics and Security.

[10]  Min Wu,et al.  Modeling and analysis of content identification , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[11]  Kurt Hornik,et al.  Multilayer feedforward networks are universal approximators , 1989, Neural Networks.

[12]  Vishal Monga,et al.  A clustering based approach to perceptual image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[13]  Jingkuan Song,et al.  Binary Generative Adversarial Networks for Image Retrieval , 2017, AAAI.

[14]  Yanqiang Lei,et al.  Video Sequence Matching Based on the Invariance of Color Correlation , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[15]  Min Wu,et al.  A decision theoretic framework for analyzing binary hash-based content identification systems , 2008, DRM '08.

[16]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[17]  Pascal Vincent,et al.  Stacked Denoising Autoencoders: Learning Useful Representations in a Deep Network with a Local Denoising Criterion , 2010, J. Mach. Learn. Res..

[18]  Kai Liu,et al.  Robust image hashing via DCT and LLE , 2016, Comput. Secur..

[19]  Meng Wang,et al.  Self-Supervised Video Hashing With Hierarchical Binary Auto-Encoder , 2018, IEEE Transactions on Image Processing.

[20]  Nitish Srivastava,et al.  Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..

[21]  Jian Lu,et al.  Video fingerprinting for copy identification: from research to industry applications , 2009, Electronic Imaging.

[22]  Fan Yang,et al.  Robust image hashing via colour vector angles and discrete wavelet transform , 2014, IET Image Process..

[23]  Li Fei-Fei,et al.  ImageNet: A large-scale hierarchical image database , 2009, CVPR.

[24]  Zi Huang,et al.  Effective Multiple Feature Hashing for Large-Scale Near-Duplicate Video Retrieval , 2013, IEEE Transactions on Multimedia.

[25]  Ping Wang,et al.  Robust image hashing based on low-rank and sparse decomposition , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[26]  Vishal Monga,et al.  Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.

[27]  Huazhong Shu,et al.  Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform , 2015, Digit. Signal Process..

[28]  Nicu Sebe,et al.  A Survey on Learning to Hash , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[29]  Chang Dong Yoo,et al.  Quantum Hashing for Multimedia , 2009, IEEE Transactions on Information Forensics and Security.

[30]  Vishal Monga,et al.  Compact Video Fingerprinting via Structural Graphical Models , 2013, IEEE Transactions on Information Forensics and Security.

[31]  Xinpeng Zhang,et al.  Lexicographical framework for image hashing with implementation based on DCT and NMF , 2009, Multimedia Tools and Applications.

[32]  Xindong Wu,et al.  A NEW SUPERVISED FEATURE SELECTION METHOD FOR PATTERN CLASSIFICATION , 2014, Comput. Intell..

[33]  Sviatoslav Voloshynovskiy,et al.  Active Content Fingerpriting , 2014, IEEE Transactions on Information Forensics and Security.

[34]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[35]  Ton Kalker,et al.  Feature Extraction and a Database Strategy for Video Fingerprinting , 2002, VISUAL.

[36]  Vishal Monga,et al.  Twofold Video Hashing With Automatic Synchronization , 2014, IEEE Transactions on Information Forensics and Security.

[37]  Pierre Moulin Statistical modeling and analysis of content identification , 2010, 2010 Information Theory and Applications Workshop (ITA).

[38]  Ramarathnam Venkatesan,et al.  New Iterative Geometric Methods for Robust Perceptual Image Hashing , 2001, Digital Rights Management Workshop.

[39]  Qiming Li,et al.  On the security of non-forgeable robust hash functions , 2008, 2008 15th IEEE International Conference on Image Processing.

[40]  Chang Dong Yoo,et al.  Robust video fingerprinting for content-based video identification , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[41]  Vishal Monga,et al.  Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.

[42]  Ton Kalker,et al.  A robust image fingerprinting system using the Radon transform , 2004, Signal Process. Image Commun..

[43]  Xiamu Niu,et al.  Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice Vector Quantization , 2012, IEEE Transactions on Image Processing.

[44]  Shichao Zhang,et al.  Robust Perceptual Image Hashing Based on Ring Partition and NMF , 2014, IEEE Transactions on Knowledge and Data Engineering.

[45]  Xuelong Li,et al.  Compact Structure Hashing via Sparse and Similarity Preserving Embedding , 2016, IEEE Transactions on Cybernetics.

[46]  Yue-nan Li Robust Content Fingerprinting Algorithm Based on Sparse Coding , 2015, IEEE Signal Processing Letters.

[47]  C. De Vleeschouwer,et al.  Robust video hashing based on radial projections of key frames , 2005, IEEE Transactions on Signal Processing.

[48]  Yoshua Bengio,et al.  Why Does Unsupervised Pre-training Help Deep Learning? , 2010, AISTATS.

[49]  Ping Wang,et al.  Robust Image Hashing Based on Selective Quaternion Invariance , 2015, IEEE Signal Processing Letters.

[50]  Min Wu,et al.  Unicity Distance of Robust Image Hashing , 2007, IEEE Transactions on Information Forensics and Security.

[51]  Thierry Pun,et al.  Conception and limits of robust perceptual hashing: towards side information assisted hash functions , 2009, Electronic Imaging.

[52]  Ioannis Pitas,et al.  Color-based descriptors for image fingerprinting , 2006, IEEE Transactions on Multimedia.

[53]  Zhenjun Tang,et al.  Robust image hashing using ring-based entropies , 2013, Signal Process..

[54]  Xuelong Li,et al.  Large Graph Hashing with Spectral Rotation , 2017, AAAI.

[55]  Min Wu,et al.  Multimedia forensic hash based on visual words , 2010, 2010 IEEE International Conference on Image Processing.

[56]  Shichao Zhang,et al.  Robust Joint Graph Sparse Coding for Unsupervised Spectral Feature Selection , 2017, IEEE Transactions on Neural Networks and Learning Systems.

[57]  Jiwu Huang,et al.  Fragility Analysis of Adaptive Quantization-Based Image Hashing , 2010, IEEE Transactions on Information Forensics and Security.

[58]  Yilong Yin,et al.  Comprehensive Feature-Based Robust Video Fingerprinting Using Tensor Model , 2016, IEEE Transactions on Multimedia.

[59]  Xinpeng Zhang,et al.  Robust Hashing for Image Authentication Using Zernike Moments and Local Features , 2013, IEEE Transactions on Information Forensics and Security.

[60]  Z. Jane Wang,et al.  Perceptual Image Hashing Based on Shape Contexts and Local Feature Points , 2012, IEEE Transactions on Information Forensics and Security.

[61]  Nicu Sebe,et al.  Compact Image Fingerprint Via Multiple Kernel Hashing , 2015, IEEE Transactions on Multimedia.