A novel approach to detecting duplicate images using multiple hash tables

This paper presents a new duplicate image detection scheme that adopts multiple hash tables in a novel way for quick image matching and, consequently, fast duplicate detection. The proposed scheme contains two phases: the feature generation phase and the duplication inspection phase. The former phase extracts the features of images that need protection and transforms them into key-value pairs, which are stored in the slots of multiple hash tables. When a possibly duplicated image needs to be examined, the latter phase hashes the features of the suspect image into the corresponding slots of the multiple hash tables and determines if the suspect image is a duplicate one. The execution time of the scheme is relatively short thanks to the unique design of the multiple hash tables. The experimental results show that the proposed scheme obtained satisfactory results both on the recall and precision rates, hence demonstrating it can effectively identify duplicate images including digitally modified copies.

[1]  Chin-Chen Chang,et al.  Image Copy Detection with Rotating Tolerance , 2005, CIS.

[2]  Patrick Gros,et al.  Robust content-based image searches for copyright protection , 2003, MMDB '03.

[3]  Zhang Xin-peng,et al.  Recent development of perceptual image hashing , 2007 .

[4]  Guorui Feng,et al.  A Robust Image Hashing Method Based on Zernike Moments , 2010 .

[5]  Cordelia Schmid,et al.  A performance evaluation of local descriptors , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[6]  Hefei Ling,et al.  Fine-search for image copy detection based on local affine-invariant descriptor and spatial dependent matching , 2009, Multimedia Tools and Applications.

[7]  G LoweDavid,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004 .

[8]  Luc Van Gool,et al.  Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..

[9]  Luo Juan,et al.  A comparison of SIFT, PCA-SIFT and SURF , 2009 .

[10]  Kadir A. Peker,et al.  Binary SIFT: Fast image retrieval using binary quantized SIFT features , 2011, 2011 9th International Workshop on Content-Based Multimedia Indexing (CBMI).

[11]  S. Govindarajulu,et al.  A Comparison of SIFT, PCA-SIFT and SURF , 2012 .

[12]  Andrew W. H. Ip,et al.  Robust Image Hashing for Image Authentication Based on DCT-DWT Composite Domain , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.

[13]  Shang-Lin Hsieh,et al.  An image authentication scheme based on digital watermarking and image secret sharing , 2010, Multimedia Tools and Applications.

[14]  Ioannis Pitas,et al.  Still Image and Video Fingerprinting , 2009, 2009 Seventh International Conference on Advances in Pattern Recognition.

[15]  Ton Kalker,et al.  A robust image fingerprinting system using the Radon transform , 2004, Signal Process. Image Commun..

[16]  Sudeep D. Thepade,et al.  PERFORMANCE COMPARISON OF IMAGE RETRIEVAL TECHNIQUES USING WAVELET PYRAMIDS OF WALSH, HAAR AND KEKRE TRANSFORMS , 2010 .

[17]  王朔中,et al.  Recent development of perceptual image hashing , 2007 .

[18]  B. S. Manjunath,et al.  Duplicate Image Detection in Large Scale Databases , 2007 .

[19]  Ioannis Pitas,et al.  Applications of toral automorphisms in image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[20]  S.M. Ji,et al.  A survey of the image copy detection , 2008, 2008 IEEE Conference on Cybernetics and Intelligent Systems.

[21]  Chong-Wah Ngo,et al.  Scale-Rotation Invariant Pattern Entropy for Keypoint-Based Near-Duplicate Detection , 2009, IEEE Transactions on Image Processing.

[22]  Chun-Shien Lu,et al.  Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication , 2005, Multimedia Systems.

[23]  Xinpeng Zhang,et al.  Lexicographical framework for image hashing with implementation based on DCT and NMF , 2009, Multimedia Tools and Applications.

[24]  Wang Rongbo,et al.  Copy image detection based on local keypoints , 2011, 2011 International Conference of Soft Computing and Pattern Recognition (SoCPaR).

[25]  Roland Siegwart,et al.  BRISK: Binary Robust invariant scalable keypoints , 2011, 2011 International Conference on Computer Vision.

[26]  Soo-Chang Pei,et al.  Secure image hashing via minimum distortion estimation , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[27]  Geoff Wyvill,et al.  SIFT and SURF Performance Evaluation against Various Image Deformations on Benchmark Dataset , 2011, 2011 International Conference on Digital Image Computing: Techniques and Applications.