Perceptual image hashing using local entropies and DWT

被引:20
作者
Tang, Z. J. [1 ]
Zhang, X. Q. [1 ]
Dai, Y. M. [1 ]
Lan, W. W. [1 ]
机构
[1] Guangxi Normal Univ, Dept Comp Sci, Guilin 541004, Peoples R China
关键词
image hashing; image entropy; discrete wavelet transform (DWT); image retrieval; image copy detection; ROBUST; SECURE; SCHEME;
D O I
10.1179/1743131X11Y.0000000039
中图分类号
TB8 [摄影技术];
学科分类号
0804 ;
摘要
Image hashing is an emerging technology in multimedia security. It uses a short string called image hash to represent an input image and finds applications in image authentication, tamper detection, digital watermark, image indexing, content-based image retrieval and image copy detection. This paper presents a hashing algorithm based on the observation that block entropies are approximately linearly changed after content-preserving manipulations. This is done by converting the input image to a fixed size, dividing the normalised image into non-overlapping blocks, extracting entropies of image blocks and applying a single-level 2D discrete wavelet transform to perform feature compression. Correlation coefficient is exploited to evaluate similarity between hashes. Experimental results show that the proposed algorithm is robust against content-preserving operations, such as JPEG compression, watermark embedding, Gamma correction, Gaussian low-pass filtering, adjustments of brightness and contrast, scaling and small angle rotation. Similarity values between hashes of different images are small, indicating good performances in discriminative capability.
引用
收藏
页码:241 / 251
页数:11
相关论文
共 20 条
  • [1] A secure and robust hash-based scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    Abbas, Vali Uddin
    [J]. SIGNAL PROCESSING, 2010, 90 (05) : 1456 - 1470
  • [2] Robust video hashing based on radial projections of key frames
    De Roover, C
    De Vleeschouwer, C
    Lefèbvre, F
    Macq, B
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (10) : 4020 - 4037
  • [3] An introduction to ROC analysis
    Fawcett, Tom
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (08) : 861 - 874
  • [4] Fridrich J., 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), P178, DOI 10.1109/ITCC.2000.844203
  • [5] Robust perceptual image hashing via matrix invariants
    Kozat, SS
    Venkatesan, R
    Mihçak, MK
    [J]. ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 3443 - 3446
  • [6] Lefebvre F., 2002, P EUR SIGN PROC C, P299
  • [7] A robust image authentication method distinguishing JPEG compression from malicious manipulation
    Lin, CY
    Chang, SF
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2001, 11 (02) : 153 - 168
  • [8] Robust and secure image hashing via non-negative matrix factorizations
    Monga, Vishal
    Mihcak, M. Kivanc
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (03) : 376 - 390
  • [9] A clustering based approach to perceptual image hashing
    Monga, Vishal
    Banerjee, Arindam
    Evans, Brian L.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (01) : 68 - 79
  • [10] Perceptual image hashing via feature points: Performance evaluation and tradeoffs
    Monga, Vishal
    Evans, Brian L.
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2006, 15 (11) : 3452 - 3465