Robust perceptual image hashing via matrix invariants

被引:192
作者
Kozat, SS [1 ]
Venkatesan, R [1 ]
Mihçak, MK [1 ]
机构
[1] Univ Illinois, Coordinated Sci Lab, Urbana, IL 61801 USA
来源
ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5 | 2004年
关键词
D O I
10.1109/ICIP.2004.1421855
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper we suggest viewing images (as well as attacks oil them) as a sequence of linear operators and propose novel hashing algorithms employing transforms that are based oil matrix invariants. To derive this sequence. we simply cover a two dimensional representation of an image by a Sequence of (possibly overlapping) rectangles R-i whose sizes and locations are chosen randomly(1) from a Suitable distribution. The restriction of the image (representation) to each R-i gives rise to a matrix A(i). The fact that A(i)'s will overlap and are random. makes the sequence (respectively) a redundant and non-standard representation of images, but is crucial for our purposes. Our algorithms first construct a secondary image, derived from input image by pseudo-randomly extracting features that approximately capture semi-global geometric characteristics. From the secondary image (which does not perceptually resemble the input), we further extract the final features which call be used as a hash value (and call be further Suitably quantized). In this paper, We use spectral matrix invariants as embodied by Singular Value Decomposition. Surprisingly. formation of the secondary image turns Out he quite important since it not only introduces further robustness (i.e. resistance against standard signal processing transformations), but also enhances the Security properties (i.e. resistance against intentional attacks). Indeed, Our experiments reveal that our hashing algorithms extract most of the geometric information from the images and hence are robust to severe perturbations (e.g. up to %50 cropping by area with 20 degree rotations) on images while avoiding misclassification. Our methods are general enough to yield a watermark embedding scheme, which will be studied in another paper.
引用
收藏
页码:3443 / 3446
页数:4
相关论文
共 7 条
[1]  
FRIDICH J, 2000, P INT C INF TECH COD
[2]  
KOZAT SS, UNPUB IEEE T IMAGE P
[3]  
MIHCAK M, 2001, P ACM WORKSH SEC PRI
[4]  
MIHCAK MK, 2001, P 4 INT INF HID WORK
[5]  
MIHCAK MK, AL C P 37 ANN ALL C
[6]  
Sun R, 2002, 2002 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I AND II, P1592, DOI 10.1109/ICOSP.2002.1180102
[7]  
Venkatesan R, 2000, 2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, P664, DOI 10.1109/ICIP.2000.899541