Two Robust Perceptual Image Hashing Schemes Based on Discrete Wavelet Transform

被引:0
|
作者
Hu, Chunqiang [1 ,2 ]
Yang, Feihong [1 ,2 ]
Xing, Xiaoshuang [3 ]
Liu, Hang [4 ]
Xiang, Tao [5 ]
Xia, Hui [6 ]
机构
[1] Chongqing Univ, Sch Big Data & Software Engn, Minist Educ, Chongqing 400044, Peoples R China
[2] Chongqing Univ, Key Lab Dependable Serv Comp Cyber Phys Soc, Minist Educ, Chongqing 400044, Peoples R China
[3] Changshu Inst Technol, Sch Comp Sci & Engn, Suzhou 215556, Peoples R China
[4] Catholic Univ Amer, Dept Elect Engn & Comp Sci, Washington, DC 20064 USA
[5] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[6] Ocean Univ China, Coll Comp Sci & Technol, Qingdao 266100, Peoples R China
基金
中国国家自然科学基金;
关键词
Feature extraction; Discrete wavelet transforms; Robustness; Transforms; Security; Consumer electronics; Resists; Noise; Image color analysis; Image coding; Image hashing; image correction; singular value decomposition; discrete wavelet transform; RING PARTITION; PATTERN; SECURE;
D O I
10.1109/TCE.2024.3474744
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Robustness, discrimination and security are essential characteristics of perceptual image hashing in cloud computing. In this paper, we propose two image hashing schemes based on block discrete wavelet transform (BDWT) to achieve these three characteristics. The basic scheme combines block discrete wavelet transform, singular value decomposition and statistics feature to extract the features of each overlapping image block. And chaotic cryptography is applied to encrypt these features. Furthermore, image correction is added to the basic scheme to realize a more comprehensive image hashing IC-BDWT, which can resist rotation attack. Meanwhile, we conduct experiments on 400 images from four public databases to analyze the proposed schemes. The receiver operating characteristic (ROC) curve of the experimental results demonstrates that the proposed hashing algorithms exhibit superior robustness and discrimination compared to the latest hashing algorithms under common content-preserving attacks. And the IC-BDWT hashing is far better than other algorithms in resisting rotation attack. Experimental results show that our schemes are secure and sensitive to secret keys.
引用
收藏
页码:6533 / 6546
页数:14
相关论文
共 50 条
  • [1] Research on Robust Image Perceptual Hashing Technology Based on Discrete Cosine Transform
    Chang, Liang
    Yan, Wen-Gang
    Wang, Wen-De
    BUSINESS, ECONOMICS, FINANCIAL SCIENCES, AND MANAGEMENT, 2012, 143 : 799 - +
  • [2] Perceptual Hashing With Complementary Color Wavelet Transform and Compressed Sensing for Reduced-Reference Image Quality Assessment
    Yu, Mengzhu
    Tang, Zhenjun
    Zhang, Xianquan
    Zhong, Bineng
    Zhang, Xinpeng
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (11) : 7559 - 7574
  • [3] Perceptual image hashing by exploiting a visual attention model along with discrete wavelet transform and discrete cosine transform
    Hassan, Ali
    JOURNAL OF ELECTRONIC IMAGING, 2024, 33 (06)
  • [4] Perceptual Image Hashing Based on Three-Dimensional Global Features and Image Energy
    Yuan, Xiaoran
    Zhao, Yan
    IEEE ACCESS, 2021, 9 : 49325 - 49337
  • [5] Robust image hashing via colour vector angles and discrete wavelet transform
    Tang, Zhenjun
    Dai, Yumin
    Zhang, Xianquan
    Huang, Liyan
    Yang, Fan
    IET IMAGE PROCESSING, 2014, 8 (03) : 142 - 149
  • [6] Robust Perceptual Image Hashing Based on Ring Partition and NMF
    Tang, Zhenjun
    Zhang, Xianquan
    Zhang, Shichao
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (03) : 711 - 724
  • [7] Robust Perceptual Image Hashing for Screen-Shooting Attack
    Liu, Tong
    Yao, Heng
    Li, Xinran
    Qin, Chuan
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 4367 - 4378
  • [8] Robust Hashing Based on Quaternion Gyrator Transform for Image Authentication
    Ouyang, Junlin
    Zhang, Xiao
    Wen, Xingzi
    IEEE ACCESS, 2020, 8 : 220585 - 220594
  • [9] A secure and robust wavelet-based hashing scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    ADVANCES IN MULTIMEDIA MODELING, PT 2, 2007, 4352 : 51 - +
  • [10] Perceptual Image Hashing for Content Authentication Based on Convolutional Neural Network With Multiple Constraints
    Qin, Chuan
    Liu, Enli
    Feng, Guorui
    Zhang, Xinpeng
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 31 (11) : 4523 - 4537