Robust video hashing based on radial projections of key frames

被引:114
作者
De Roover, C [1 ]
De Vleeschouwer, C
Lefèbvre, F
Macq, B
机构
[1] Catholic Univ Louvain, Lab Telecommun & Teledetect, B-1348 Louvain, Belgium
[2] THOMSON R&D, Rennes, France
关键词
content-based authentication; copy detection; image digest; robust hashing; video indexing;
D O I
10.1109/TSP.2005.855414
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Robust signal hashing defines a feature vector that characterizes the signal, independently of 'nonsignificant' distortions of its content. When dealing with images, the considered distortions are typically due to compression or small geometrical manipulations. In other words, robustness means that images that are visually indistinguishable should produce equal or similar hash values. To discriminate image contents, a hash function should produce distinct outputs for different images. Our paper first proposes a robust hashing algorithm for still images. It is based on radial projection of the image pixels and is denoted the Radial hASHing (RASH) algorithm. Experimental results provided on the USC-SIPI dataset reveal that the proposed RASH feature vector is more robust and provides much stronger discrimination than a conventional histogram-based feature vector. The RASH vector appears to be a good candidate to build indexing algorithms, copy-detection systems, of content-based authentication mechanisms. To take benefit from the RASH vector capabilities, video content is summarized into key frames, each of them characterizing a video shot and described by its RASH Vector. The resulting video hashing system works in real time and supports most distortions due to. common spatial and temporal video distortions.
引用
收藏
页码:4020 / 4037
页数:18
相关论文
共 38 条
[1]  
AIGRAIN P, 1996, MULTIMEDIA TOOLS APP, V3
[2]  
[Anonymous], P INT WORKSH CONT BA
[3]  
[Anonymous], 1991, P VDB
[4]   DISCRETE RADON-TRANSFORM [J].
BEYLKIN, G .
IEEE TRANSACTIONS ON ACOUSTICS SPEECH AND SIGNAL PROCESSING, 1987, 35 (02) :162-172
[5]  
Bhattacharjee S, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 1, P435, DOI 10.1109/ICIP.1998.723518
[6]   Design and statistical analysis of a hash-aided image watermarking system [J].
Cannons, J ;
Moulin, P .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (10) :1393-1408
[7]  
CHEN QS, 1994, IEEE T PATTERN ANAL, V16, P1156
[8]   Efficient video similarity measurement with video signature [J].
Cheung, SCS ;
Zakhor, A .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2003, 13 (01) :59-74
[9]   Visual hash for oblivious watermarking [J].
Fridrich, J .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 :286-294
[10]  
FRIDRICH J, 2000, P INT C INF TECHN CO, P173