TMCIH: Perceptual Robust Image Hashing with Transformer-based Multi-layer Constraints

被引:8
作者
Fang, Yaodong [1 ]
Zhou, Yuanding [1 ]
Li, Xinran [1 ]
Kong, Ping [2 ]
Qin, Chuan [1 ]
机构
[1] Univ Shanghai Sci & Technol, Shanghai, Peoples R China
[2] Shanghai Univ Med & Hlth Sci, Shanghai, Peoples R China
来源
PROCEEDINGS OF THE 2023 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH&MMSEC 2023 | 2023年
关键词
Perceptual image hashing; Transformer; robustness; content authentication;
D O I
10.1145/3577163.3595113
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent decades, many perceptual image hashing schemes for content authentication have been proposed. However, existing algorithms cannot provide satisfactory robustness and discrimination in the face of complex manipulations in real scenarios. In this work, we propose a novel perceptual robust image hashing scheme with transformer-based multi-layer constraints. Specifically, we first exploit the Transformer structure into the field of perceptual image hashing, and an integrated loss function is designed to optimize the training of the model. In addition, to solve the issue of the simple content-preserving manipulations used in previous datasets, we construct a more challenging image dataset based on various manipulations, which can deal with complex image authentication scenarios. Experimental results demonstrate that our scheme achieves competitive results compared with existing schemes.
引用
收藏
页码:7 / 12
页数:6
相关论文
共 20 条
[1]   Image Authentication Using Block Truncation Coding in Lifting Wavelet Domain [J].
Bhardwaj, Anuj ;
Verma, Vivek Singh ;
Gupta, Sandesh .
INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2022, 22 (01)
[2]  
Dosovitskiy A., 2021, ICLR
[3]  
Douze M, 2022, Arxiv, DOI arXiv:2106.09672
[4]   Perceptual hashing for image authentication: A survey [J].
Du, Ling ;
Ho, Anthony T. S. ;
Cong, Runmin .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2020, 81
[5]   Deep Unsupervised Weighted Hashing for Remote Sensing Image Retrieval [J].
Jing, Weipeng ;
Xu, Zekun ;
Li, Linhui ;
Wang, Jian ;
He, Yue ;
Chen, Guangsheng .
JOURNAL OF DATABASE MANAGEMENT, 2022, 33 (02) :1-19
[6]   Unified Performance Evaluation Method for Perceptual Image Hashing [J].
Li, Xinran ;
Qin, Chuan ;
Wang, Zichi ;
Qian, Zhenxing ;
Zhang, Xinpeng .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 :1404-1419
[7]   Robust and Secure Image Fingerprinting Learned by Neural Network [J].
Li, Yuenan ;
Wang, Dongdong ;
Tang, Linlin .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2020, 30 (02) :362-375
[8]   Microsoft COCO: Common Objects in Context [J].
Lin, Tsung-Yi ;
Maire, Michael ;
Belongie, Serge ;
Hays, James ;
Perona, Pietro ;
Ramanan, Deva ;
Dollar, Piotr ;
Zitnick, C. Lawrence .
COMPUTER VISION - ECCV 2014, PT V, 2014, 8693 :740-755
[9]   Exploiting deep textures for image retrieval [J].
Liu, Guang-Hai ;
Yang, Jing-Yu .
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2023, 14 (02) :483-494
[10]  
Naseer Muzammal, 2021, Advances in Neural Information Processing Systems